Action not permitted
Modal body text goes here.
CVE-2013-0435
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:25:10.298Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201406-32", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "MDVSA-2013:095", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:095" }, { "name": "SSRT101156", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2" }, { "name": "TA13-032A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html" }, { "name": "oval:org.mitre.oval:def:19520", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19520" }, { "name": "RHSA-2013:0236", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0236.html" }, { "name": "RHSA-2013:1455", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html" }, { "name": "VU#858729", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/858729" }, { "name": "RHSA-2013:0237", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0237.html" }, { "name": "HPSBUX02857", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2" }, { "name": "57729", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/57729" }, { "name": "RHSA-2013:0247", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0247.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/c1fa21042291" }, { "name": "oval:org.mitre.oval:def:16489", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16489" }, { "name": "HPSBMU02874", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=906892" }, { "name": "SSRT101103", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2" }, { "name": "openSUSE-SU-2013:0312", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" }, { "name": "openSUSE-SU-2013:0377", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" }, { "name": "RHSA-2013:0246", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0246.html" }, { "name": "RHSA-2013:1456", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html" }, { "name": "HPSBUX02864", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2" }, { "name": "RHSA-2013:0245", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0245.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS" }, { "name": "SSRT101184", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2" }, { "name": "oval:org.mitre.oval:def:19078", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19078" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "GLSA-201406-32", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "MDVSA-2013:095", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:095" }, { "name": "SSRT101156", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2" }, { "name": "TA13-032A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html" }, { "name": "oval:org.mitre.oval:def:19520", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19520" }, { "name": "RHSA-2013:0236", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0236.html" }, { "name": "RHSA-2013:1455", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html" }, { "name": "VU#858729", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/858729" }, { "name": "RHSA-2013:0237", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0237.html" }, { "name": "HPSBUX02857", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2" }, { "name": "57729", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/57729" }, { "name": "RHSA-2013:0247", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0247.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/c1fa21042291" }, { "name": "oval:org.mitre.oval:def:16489", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16489" }, { "name": "HPSBMU02874", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=906892" }, { "name": "SSRT101103", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2" }, { "name": "openSUSE-SU-2013:0312", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" }, { "name": "openSUSE-SU-2013:0377", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" }, { "name": "RHSA-2013:0246", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0246.html" }, { "name": "RHSA-2013:1456", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html" }, { "name": "HPSBUX02864", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2" }, { "name": "RHSA-2013:0245", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0245.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS" }, { "name": "SSRT101184", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2" }, { "name": "oval:org.mitre.oval:def:19078", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19078" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2013-0435", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201406-32", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "MDVSA-2013:095", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:095" }, { "name": "SSRT101156", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2" }, { "name": "TA13-032A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html" }, { "name": "oval:org.mitre.oval:def:19520", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19520" }, { "name": "RHSA-2013:0236", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0236.html" }, { "name": "RHSA-2013:1455", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html" }, { "name": "VU#858729", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/858729" }, { "name": "RHSA-2013:0237", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0237.html" }, { "name": "HPSBUX02857", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2" }, { "name": "57729", "refsource": "BID", "url": "http://www.securityfocus.com/bid/57729" }, { "name": "RHSA-2013:0247", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0247.html" }, { "name": "http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/c1fa21042291", "refsource": "CONFIRM", "url": "http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/c1fa21042291" }, { "name": "oval:org.mitre.oval:def:16489", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16489" }, { "name": "HPSBMU02874", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2" }, { "name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=906892", "refsource": "CONFIRM", "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=906892" }, { "name": "SSRT101103", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2" }, { "name": "openSUSE-SU-2013:0312", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" }, { "name": "openSUSE-SU-2013:0377", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" }, { "name": "RHSA-2013:0246", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0246.html" }, { "name": "RHSA-2013:1456", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html" }, { "name": "HPSBUX02864", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2" }, { "name": "RHSA-2013:0245", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0245.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" }, { "name": "http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS", "refsource": "CONFIRM", "url": "http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS" }, { "name": "SSRT101184", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2" }, { "name": "oval:org.mitre.oval:def:19078", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19078" }, { "name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056", "refsource": "CONFIRM", "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2013-0435", "datePublished": "2013-02-02T00:00:00", "dateReserved": "2012-12-07T00:00:00", "dateUpdated": "2024-08-06T14:25:10.298Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2013-0435\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2013-02-02T00:55:01.957\",\"lastModified\":\"2024-11-21T01:47:32.893\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \\\"Better handling of UI elements.\\\"\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad no especificada en el componente Java Runtime Environment (JRE) en Oracle Java SE v7 hasta Update 11 y v6 hasta Update 38, permite a atacantes remotos afectar la confidencialidad mediante vectores relacionados con JAX-WS.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C27372B-A091-46D5-AE39-A44BBB1D9EE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4B153FD-E20B-4909-8B10-884E48F5B590\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*\",\"matchCriteriaId\":\"F21933FB-A27C-4AF3-9811-2DE28484A5A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2B20041-EB5D-4FA4-AC7D-C35E7878BCFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB106FA9-26CE-48C5-AEA5-FD1A5454AEE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5831D70B-3854-4CB8-B88D-40F1743DAEE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEB101C9-CA38-4421-BC0C-C1AD47AA2CC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA302DF3-ABBB-4262-B206-4C0F7B5B1E91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A8EBCB-5E6A-42F0-8D07-F3A3D1C850F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CD8A54E-185B-4D34-82EF-C0C05739EC12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FFC7F0D-1F32-4235-8359-277CE41382DF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E44FC8AF-F76F-4A8E-8D03-4F8BCA8CB031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6152036D-6421-4AE4-9223-766FE07B5A44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE8B0935-6637-413D-B896-28E0ED7F2CEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"30B480BC-0886-4B19-B0A5-57B531077F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D375CECB-405C-4E18-A7E8-9C5A2F97BD69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"52EEEA5A-E77C-43CF-A063-9D5C64EA1870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*\",\"matchCriteriaId\":\"003746F6-DEF0-4D0F-AD97-9E335868E301\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF830E0E-0169-4B6A-81FF-2E9FCD7D913B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BAE3670-0938-480A-8472-DFF0B3A0D0BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EC967FF-26A6-4498-BC09-EC23B2B75CBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*\",\"matchCriteriaId\":\"02781457-4E40-46A9-A5F7-945232A8C2B1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF13B96D-1F80-4672-8DA3-F86F6D3BF070\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1A2D440-D966-41A6-955D-38B28DDE0FDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1C57774-AD93-4162-8E45-92B09139C808\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD7C4194-D34A-418F-9B00-5C6012844AAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF7D86B-1B4D-4E1F-9EF0-DA7E419D7E99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0B82FB1-0F0E-44F9-87AE-628517279E4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0A67640-2F4A-488A-9D8F-3FE1F4DA8DEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D60D98D-4363-44A0-AAB4-B61BA623EE21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*\",\"matchCriteriaId\":\"23CDA4F0-C32B-4B08-A377-7D4426C2F569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E76476E-4120-46A9-90A8-A95FE89636CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A84689-0CED-404F-8DC3-708BEB37D2CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*\",\"matchCriteriaId\":\"738EC3E5-A4EB-47FE-9C9A-7C8E8C669765\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF56E0D9-612D-4215-9C76-560AE0661A05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA717604-4BB0-4968-B258-7C9F884016FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA71FCF4-580F-432D-AADC-65A2A92CEBC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBCD143C-057D-4F42-B487-46801E14ACF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"09027C19-D442-446F-B7A8-21DB6787CF43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A0FEC28-0707-4F42-9740-78F3D2D551EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3C5879A-A608-4230-9DC1-C27F0F48A13B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A3B254-8580-45DB-BDE4-5B5A29CBFFB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*\",\"matchCriteriaId\":\"AADBB4F9-E43E-428B-9979-F47A15696C85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*\",\"matchCriteriaId\":\"49260B94-05DE-4B78-9068-6F5F6BFDD19E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4FDE9EB-08FE-436E-A265-30E83B15DB23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE409D5C-8F9F-4DE9-ACB7-0E0B813F6399\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7158D2C0-E9AC-4CD6-B777-EA7B7A181997\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*\",\"matchCriteriaId\":\"B08C075B-9FC0-4381-A9E4-FFF0362BD308\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*\",\"matchCriteriaId\":\"F587E635-3A15-4186-B6A1-F99BE0A56820\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"90EC6C13-4B37-48E5-8199-A702A944D5A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2528152C-E20A-4D97-931C-A5EC3CEAA06D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"A99DAB4C-272B-4C91-BC70-7729E1152590\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"30DFC10A-A4D9-4F89-B17C-AB9260087D29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"272A5C44-18EC-41A9-8233-E9D4D0734EA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*\",\"matchCriteriaId\":\"81C2C04D-D4BA-4C87-9609-C53AA63BFF19\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*\",\"matchCriteriaId\":\"301E96A3-AD2F-48F3-9166-571BD6F9FAE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C9215D9-DB64-4CEE-85E6-E247035EFB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*\",\"matchCriteriaId\":\"352509FE-54D9-4A59-98B7-96E5E98BC2CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3EC13D3-4CE7-459C-A7D7-7D38C1284720\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CDCD1B4-C5F3-4188-B05F-23922F7DE517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*\",\"matchCriteriaId\":\"1824DA2D-26D5-4595-8376-8E41AB8C5E52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*\",\"matchCriteriaId\":\"B72F78B7-10D1-49CF-AC4D-3B10921CB633\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*\",\"matchCriteriaId\":\"60D05860-9424-4727-B583-74A35BC9BDFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*\",\"matchCriteriaId\":\"F85DB431-FEA4-42E7-AC29-6B66174DCD9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB7E911C-C780-440A-ABFF-CCE09061BB4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*\",\"matchCriteriaId\":\"0381EE39-2F60-49FD-A63A-B9E81C9033CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AD75455-B7F0-4F42-98E7-CAA43787D606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BF0FD06-3953-49AB-A9AA-ACB6883E2D2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*\",\"matchCriteriaId\":\"62823E8E-99CF-40DB-B43E-CBA4E9A2F916\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEA04B0D-D4E3-497D-9564-046B1CDA2342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3A4FEC7-A4A0-4B5C-A56C-8F80AE19865E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"722A93D8-B5BC-42F3-92A2-E424F61269A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"775F2611-F11C-4B84-8F40-0D034B81BF18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"F20FDD9F-FF45-48BC-9207-54FB02E76071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA326F5-894A-4B01-BCA3-B126DA81CA59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*\",\"matchCriteriaId\":\"228AB7B4-4BA4-43D4-B562-D438884DB152\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD5C688-2103-4D60-979E-D9BE69A989C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*\",\"matchCriteriaId\":\"21421215-F722-4207-A2E5-E2DF4B29859B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFB9EA23-0EF7-4582-A265-3F5AA9EC81B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*\",\"matchCriteriaId\":\"C367B418-659E-4627-B1F1-1B1216C99055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD5E6D4E-DDDD-4B45-B5E9-F8A916287AF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*\",\"matchCriteriaId\":\"7358492A-491C-491E-AEDF-63CB82619BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3DACAAF-AFDC-4391-9E85-344F30937F76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D98175BF-B084-4FA5-899D-9E80DC3923EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"820632CE-F8DF-47EE-B716-7530E60008B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA2BD0A3-7B2D-447B-ABAC-7B867B03B632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"D54AB785-E9B7-47BD-B756-0C3A629D67DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9412098-0353-4F7B-9245-010557E6C651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD30DAEB-4893-41CF-A455-B69C463B9337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*\",\"matchCriteriaId\":\"21D6CE7E-A036-496C-8E08-A87F62B5290A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8F93BBE-1E8C-4EB3-BCC7-20AB2D813F98\"}]}]}],\"references\":[{\"url\":\"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=906892\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/c1fa21042291\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0236.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0237.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0245.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0246.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0247.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1455.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1456.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201406-32.xml\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.kb.cert.org/vuls/id/858729\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:095\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/57729\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA13-032A.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16489\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19078\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19520\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=906892\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/c1fa21042291\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0236.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0237.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0245.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0246.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0247.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1455.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1456.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201406-32.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/858729\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:095\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/57729\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA13-032A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16489\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19078\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19520\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorComment\":\"Per http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html\\r\\n\\r\\n\\\"Applies to client deployment of Java only. This vulnerability can be exploited only through untrusted Java Web Start applications and untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)\\\"\"}}" } }
rhsa-2013_0246
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-openjdk packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "These packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit.\n\nMultiple improper permission check issues were discovered in the AWT,\nCORBA, JMX, and Libraries components in OpenJDK. An untrusted Java\napplication or applet could use these flaws to bypass Java sandbox\nrestrictions. (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441, CVE-2013-1475,\nCVE-2013-1476, CVE-2013-0429, CVE-2013-0450, CVE-2013-0425, CVE-2013-0426,\nCVE-2013-0428)\n\nMultiple flaws were found in the way image parsers in the 2D and AWT\ncomponents handled image raster parameters. A specially-crafted image could\ncause Java Virtual Machine memory corruption and, possibly, lead to\narbitrary code execution with the virtual machine privileges.\n(CVE-2013-1478, CVE-2013-1480)\n\nA flaw was found in the AWT component\u0027s clipboard handling code. An\nuntrusted Java application or applet could use this flaw to access\nclipboard data, bypassing Java sandbox restrictions. (CVE-2013-0432)\n\nThe default Java security properties configuration did not restrict access\nto certain com.sun.xml.internal packages. An untrusted Java application or\napplet could use this flaw to access information, bypassing certain Java\nsandbox restrictions. This update lists the whole package as restricted.\n(CVE-2013-0435)\n\nMultiple improper permission check issues were discovered in the Libraries,\nNetworking, and JAXP components. An untrusted Java application or applet\ncould use these flaws to bypass certain Java sandbox restrictions.\n(CVE-2013-0427, CVE-2013-0433, CVE-2013-0434)\n\nIt was discovered that the RMI component\u0027s CGIHandler class used user\ninputs in error messages without any sanitization. An attacker could use\nthis flaw to perform a cross-site scripting (XSS) attack. (CVE-2013-0424)\n\nIt was discovered that the SSL/TLS implementation in the JSSE component\ndid not properly enforce handshake message ordering, allowing an unlimited\nnumber of handshake restarts. A remote attacker could use this flaw to\nmake an SSL/TLS server using JSSE consume an excessive amount of CPU by\ncontinuously restarting the handshake. (CVE-2013-0440)\n\nIt was discovered that the JSSE component did not properly validate\nDiffie-Hellman public keys. An SSL/TLS client could possibly use this flaw\nto perform a small subgroup attack. (CVE-2013-0443)\n\nThis erratum also upgrades the OpenJDK package to IcedTea6 1.11.6. Refer to\nthe NEWS file, linked to in the References, for further information.\n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0246", "url": "https://access.redhat.com/errata/RHSA-2013:0246" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS", "url": "http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS" }, { "category": "external", "summary": "859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "860652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860652" }, { "category": "external", "summary": "906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "907460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907460" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0246.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-openjdk security update", "tracking": { "current_release_date": "2024-12-08T10:36:47+00:00", "generator": { "date": "2024-12-08T10:36:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2013:0246", "initial_release_date": "2013-02-08T19:06:00+00:00", "revision_history": [ { "date": "2013-02-08T19:06:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-02-08T19:12:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-08T10:36:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.33.1.11.6.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.33.1.11.6.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.33.1.11.6.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.33.1.11.6.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.33.1.11.6.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.33.1.11.6.el5_9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.33.1.11.6.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.33.1.11.6.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.33.1.11.6.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.33.1.11.6.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.33.1.11.6.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.33.1.11.6.el5_9?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.33.1.11.6.el5_9?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "relates_to_product_reference": "5Server-5.9.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-0424", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906813" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0424" }, { "category": "external", "summary": "RHBZ#906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0424", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0424" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)" }, { "cve": "CVE-2013-0425", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907344" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0425" }, { "category": "external", "summary": "RHBZ#907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0425", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0425" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)" }, { "cve": "CVE-2013-0426", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907346" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0426" }, { "category": "external", "summary": "RHBZ#907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0426", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0426" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)" }, { "cve": "CVE-2013-0427", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907455" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0427" }, { "category": "external", "summary": "RHBZ#907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)" }, { "cve": "CVE-2013-0428", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907207" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"incorrect checks for proxy classes\" in the Reflection API.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0428" }, { "category": "external", "summary": "RHBZ#907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0428", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)" }, { "cve": "CVE-2013-0429", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907460" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue involves the creation of a single PresentationManager that is shared across multiple thread groups, which allows remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0429" }, { "category": "external", "summary": "RHBZ#907460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907460" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0429", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0429" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0429", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0429" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694)" }, { "cve": "CVE-2013-0432", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907219" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient clipboard access premission checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0432" }, { "category": "external", "summary": "RHBZ#907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0432", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)" }, { "cve": "CVE-2013-0433", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907456" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0433" }, { "category": "external", "summary": "RHBZ#907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0433", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0433" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)" }, { "cve": "CVE-2013-0434", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907453" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0434" }, { "category": "external", "summary": "RHBZ#907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0434", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0434" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)" }, { "cve": "CVE-2013-0435", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906892" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0435" }, { "category": "external", "summary": "RHBZ#906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0435", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)" }, { "cve": "CVE-2013-0440", "discovery_date": "2012-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "859140" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0440" }, { "category": "external", "summary": "RHBZ#859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0440", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)" }, { "cve": "CVE-2013-0441", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907458" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka \"missing serialization restriction.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing serialization restriction (CORBA, 7201066)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0441" }, { "category": "external", "summary": "RHBZ#907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0441", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0441" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing serialization restriction (CORBA, 7201066)" }, { "cve": "CVE-2013-0442", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906899" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0442" }, { "category": "external", "summary": "RHBZ#906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0442", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)" }, { "cve": "CVE-2013-0443", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907340" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a \"small subgroup attack\" to force the use of weak session keys or obtain sensitive information about the private key.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0443" }, { "category": "external", "summary": "RHBZ#907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0443", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0443" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)" }, { "cve": "CVE-2013-0445", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906900" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0445" }, { "category": "external", "summary": "RHBZ#906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0445", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)" }, { "cve": "CVE-2013-0450", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906911" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of \"access control context\" in the JMX RequiredModelMBean class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0450" }, { "category": "external", "summary": "RHBZ#906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0450", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)" }, { "cve": "CVE-2013-1475", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "860652" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"IIOP type reuse management\" in ObjectStreamClass.java.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1475" }, { "category": "external", "summary": "RHBZ#860652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1475", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1475" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50)" }, { "cve": "CVE-2013-1476", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907457" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via \"certain value handler constructors.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1476" }, { "category": "external", "summary": "RHBZ#907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1476", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)" }, { "cve": "CVE-2013-1478", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906894" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" that can trigger an integer overflow and memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1478" }, { "category": "external", "summary": "RHBZ#906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1478", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)" }, { "cve": "CVE-2013-1480", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906904" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" in awt_parseImage.c, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1480" }, { "category": "external", "summary": "RHBZ#906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1480", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1480" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.src", "5Server-5.9.Z:java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.i386", "5Server-5.9.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)" } ] }
rhsa-2013_0626
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.7.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "IBM Java SE version 7 includes the IBM Java Runtime Environment and the IBM\nJava Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java Runtime\nEnvironment and the IBM Java Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM Security alerts page,\nlisted in the References section. (CVE-2012-1541, CVE-2012-3174,\nCVE-2012-3213, CVE-2012-3342, CVE-2013-0351, CVE-2013-0409, CVE-2013-0419,\nCVE-2013-0422, CVE-2013-0423, CVE-2013-0424, CVE-2013-0425, CVE-2013-0426,\nCVE-2013-0427, CVE-2013-0428, CVE-2013-0431, CVE-2013-0432, CVE-2013-0433,\nCVE-2013-0434, CVE-2013-0435, CVE-2013-0437, CVE-2013-0438, CVE-2013-0440,\nCVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0444, CVE-2013-0445,\nCVE-2013-0446, CVE-2013-0449, CVE-2013-0450, CVE-2013-0809, CVE-2013-1473,\nCVE-2013-1476, CVE-2013-1478, CVE-2013-1480, CVE-2013-1484, CVE-2013-1485,\nCVE-2013-1486, CVE-2013-1487, CVE-2013-1493)\n\nAll users of java-1.7.0-ibm are advised to upgrade to these updated\npackages, containing the IBM Java SE 7 SR4 release. All running instances\nof IBM Java must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0626", "url": "https://access.redhat.com/errata/RHSA-2013:0626" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://www.ibm.com/developerworks/java/jdk/alerts/", "url": "https://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "894172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=894172" }, { "category": "external", "summary": "894934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=894934" }, { "category": "external", "summary": "906447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906447" }, { "category": "external", "summary": "906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "906914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914" }, { "category": "external", "summary": "906916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916" }, { "category": "external", "summary": "906917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917" }, { "category": "external", "summary": "906918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918" }, { "category": "external", "summary": "906921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921" }, { "category": "external", "summary": "906923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923" }, { "category": "external", "summary": "906932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906932" }, { "category": "external", "summary": "906933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933" }, { "category": "external", "summary": "906935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935" }, { "category": "external", "summary": "907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "907218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907218" }, { "category": "external", "summary": "907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "907222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907222" }, { "category": "external", "summary": "907223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223" }, { "category": "external", "summary": "907226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226" }, { "category": "external", "summary": "907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "913014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913014" }, { "category": "external", "summary": "913021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913021" }, { "category": "external", "summary": "913025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913025" }, { "category": "external", "summary": "913030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913030" }, { "category": "external", "summary": "917550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917550" }, { "category": "external", "summary": "917553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917553" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0626.json" } ], "title": "Red Hat Security Advisory: java-1.7.0-ibm security update", "tracking": { "current_release_date": "2024-12-08T10:37:09+00:00", "generator": { "date": "2024-12-08T10:37:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2013:0626", "initial_release_date": "2013-03-11T18:48:00+00:00", "revision_history": [ { "date": "2013-03-11T18:48:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-11-14T19:14:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-08T10:37:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "product": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "product_id": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-demo@1.7.0.4.0-1jpp.2.el5_9?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "product": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "product_id": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-jdbc@1.7.0.4.0-1jpp.2.el5_9?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "product": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "product_id": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-devel@1.7.0.4.0-1jpp.2.el5_9?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "product": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "product_id": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm@1.7.0.4.0-1jpp.2.el5_9?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "product": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "product_id": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-src@1.7.0.4.0-1jpp.2.el5_9?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "product": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "product_id": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-demo@1.7.0.4.0-1jpp.2.el5_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "product": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "product_id": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-jdbc@1.7.0.4.0-1jpp.2.el5_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "product": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "product_id": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-devel@1.7.0.4.0-1jpp.2.el5_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "product": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "product_id": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm@1.7.0.4.0-1jpp.2.el5_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "product": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "product_id": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-src@1.7.0.4.0-1jpp.2.el5_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "product": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "product_id": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-demo@1.7.0.4.0-1jpp.2.el6_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "product": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "product_id": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-jdbc@1.7.0.4.0-1jpp.2.el6_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "product": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "product_id": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-devel@1.7.0.4.0-1jpp.2.el6_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "product": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "product_id": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm@1.7.0.4.0-1jpp.2.el6_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "product": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "product_id": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-src@1.7.0.4.0-1jpp.2.el6_4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "product": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "product_id": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-demo@1.7.0.4.0-1jpp.2.el5_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "product": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "product_id": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-jdbc@1.7.0.4.0-1jpp.2.el5_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "product": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "product_id": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-devel@1.7.0.4.0-1jpp.2.el5_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "product": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "product_id": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm@1.7.0.4.0-1jpp.2.el5_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "product": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "product_id": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-src@1.7.0.4.0-1jpp.2.el5_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "product": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "product_id": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-demo@1.7.0.4.0-1jpp.2.el6_4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "product": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "product_id": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-jdbc@1.7.0.4.0-1jpp.2.el6_4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "product": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "product_id": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-devel@1.7.0.4.0-1jpp.2.el6_4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "product": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "product_id": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm@1.7.0.4.0-1jpp.2.el6_4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "product": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "product_id": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-src@1.7.0.4.0-1jpp.2.el6_4?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "product": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "product_id": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-demo@1.7.0.4.0-1jpp.2.el5_9?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "product": { "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "product_id": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-plugin@1.7.0.4.0-1jpp.2.el5_9?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "product": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "product_id": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-jdbc@1.7.0.4.0-1jpp.2.el5_9?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "product": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "product_id": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-devel@1.7.0.4.0-1jpp.2.el5_9?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "product": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "product_id": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm@1.7.0.4.0-1jpp.2.el5_9?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "product": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "product_id": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-src@1.7.0.4.0-1jpp.2.el5_9?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "product": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "product_id": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-demo@1.7.0.4.0-1jpp.2.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "product": { "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "product_id": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-plugin@1.7.0.4.0-1jpp.2.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "product": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "product_id": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-jdbc@1.7.0.4.0-1jpp.2.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "product": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "product_id": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-devel@1.7.0.4.0-1jpp.2.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "product": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "product_id": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm@1.7.0.4.0-1jpp.2.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "product": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "product_id": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-src@1.7.0.4.0-1jpp.2.el5_9?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "product": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "product_id": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-demo@1.7.0.4.0-1jpp.2.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "product": { "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "product_id": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-plugin@1.7.0.4.0-1jpp.2.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "product": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "product_id": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-jdbc@1.7.0.4.0-1jpp.2.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "product": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "product_id": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-devel@1.7.0.4.0-1jpp.2.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "product": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "product_id": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm@1.7.0.4.0-1jpp.2.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "product": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "product_id": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-src@1.7.0.4.0-1jpp.2.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "product": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "product_id": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-demo@1.7.0.4.0-1jpp.2.el6_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "product": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "product_id": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-devel@1.7.0.4.0-1jpp.2.el6_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "product": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "product_id": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm@1.7.0.4.0-1jpp.2.el6_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "product": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "product_id": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-src@1.7.0.4.0-1jpp.2.el6_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "product": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "product_id": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-jdbc@1.7.0.4.0-1jpp.2.el6_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "product": { "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "product_id": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-plugin@1.7.0.4.0-1jpp.2.el6_4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "product": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "product_id": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-demo@1.7.0.4.0-1jpp.2.el6_4?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "product": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "product_id": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-jdbc@1.7.0.4.0-1jpp.2.el6_4?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "product": { "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "product_id": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-plugin@1.7.0.4.0-1jpp.2.el6_4?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "product": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "product_id": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-devel@1.7.0.4.0-1jpp.2.el6_4?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "product": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "product_id": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm@1.7.0.4.0-1jpp.2.el6_4?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "product": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "product_id": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-ibm-src@1.7.0.4.0-1jpp.2.el6_4?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386" }, "product_reference": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc" }, "product_reference": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64" }, "product_reference": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" }, "product_reference": "java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-1541", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906914" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1541" }, { "category": "external", "summary": "RHBZ#906914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1541", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2012-3174", "discovery_date": "2013-01-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "894934" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java 7 before Update 11 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2013-0422. NOTE: some parties have mapped CVE-2012-3174 to an issue involving recursive use of the Reflection API, but that issue is already covered as part of CVE-2013-0422. This identifier is for a different vulnerability whose details are not public as of 20130114.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MethodHandles incorrect permission checks (Libraries, 8004933)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3174" }, { "category": "external", "summary": "RHBZ#894934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=894934" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3174", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3174" } ], "release_date": "2013-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: MethodHandles incorrect permission checks (Libraries, 8004933)" }, { "cve": "CVE-2012-3213", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907223" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3213" }, { "category": "external", "summary": "RHBZ#907223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3213", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)" }, { "cve": "CVE-2012-3342", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906917" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3342" }, { "category": "external", "summary": "RHBZ#906917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3342", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2012-5085", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865541" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote authenticated users to have an unspecified impact via unknown vectors related to Networking. NOTE: the Oracle CPU states that this issue has a 0.0 CVSS score. If so, then this is not a vulnerability and this issue should not be included in CVE.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: disable Gopher support by default (Gopher, 7189567)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5085" }, { "category": "external", "summary": "RHBZ#865541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865541" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5085", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5085" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5085", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5085" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: disable Gopher support by default (Gopher, 7189567)" }, { "cve": "CVE-2013-0351", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906923" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0351" }, { "category": "external", "summary": "RHBZ#906923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0351", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0409", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907226" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38 allows remote attackers to affect confidentiality via vectors related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0409" }, { "category": "external", "summary": "RHBZ#907226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0409", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0409" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)" }, { "cve": "CVE-2013-0419", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906918" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0419" }, { "category": "external", "summary": "RHBZ#906918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0419", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0422", "discovery_date": "2013-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "894172" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114. CVE-2013-0422 covers both the JMX/MBean and Reflection API issues. NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks. NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11. If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MethodHandles.Lookup incorrect permission checks, Java 7 0day (Libraries, 8006017)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0422" }, { "category": "external", "summary": "RHBZ#894172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=894172" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0422", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0422" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2013-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-05-25T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: MethodHandles.Lookup incorrect permission checks, Java 7 0day (Libraries, 8006017)" }, { "cve": "CVE-2013-0423", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906921" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0423" }, { "category": "external", "summary": "RHBZ#906921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0423", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0424", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906813" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0424" }, { "category": "external", "summary": "RHBZ#906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0424", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0424" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)" }, { "cve": "CVE-2013-0425", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907344" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0425" }, { "category": "external", "summary": "RHBZ#907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0425", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0425" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)" }, { "cve": "CVE-2013-0426", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907346" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0426" }, { "category": "external", "summary": "RHBZ#907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0426", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0426" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)" }, { "cve": "CVE-2013-0427", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907455" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0427" }, { "category": "external", "summary": "RHBZ#907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)" }, { "cve": "CVE-2013-0428", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907207" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"incorrect checks for proxy classes\" in the Reflection API.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0428" }, { "category": "external", "summary": "RHBZ#907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0428", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)" }, { "cve": "CVE-2013-0431", "discovery_date": "2013-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906447" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows user-assisted remote attackers to bypass the Java security sandbox via unspecified vectors related to JMX, aka \"Issue 52,\" a different vulnerability than CVE-2013-1490.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JMX Introspector missing package access check (JMX, 8000539, SE-2012-01 Issue 52)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0431" }, { "category": "external", "summary": "RHBZ#906447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906447" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0431", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0431" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0431", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0431" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2013-01-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-05-25T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JMX Introspector missing package access check (JMX, 8000539, SE-2012-01 Issue 52)" }, { "cve": "CVE-2013-0432", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907219" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient clipboard access premission checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0432" }, { "category": "external", "summary": "RHBZ#907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0432", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)" }, { "cve": "CVE-2013-0433", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907456" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0433" }, { "category": "external", "summary": "RHBZ#907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0433", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0433" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)" }, { "cve": "CVE-2013-0434", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907453" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0434" }, { "category": "external", "summary": "RHBZ#907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0434", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0434" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)" }, { "cve": "CVE-2013-0435", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906892" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0435" }, { "category": "external", "summary": "RHBZ#906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0435", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)" }, { "cve": "CVE-2013-0437", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907222" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and JavaFX 2.2.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u13 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0437" }, { "category": "external", "summary": "RHBZ#907222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0437", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0437" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u13 (2D)" }, { "cve": "CVE-2013-0438", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906935" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0438" }, { "category": "external", "summary": "RHBZ#906935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0438", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0438" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0440", "discovery_date": "2012-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "859140" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0440" }, { "category": "external", "summary": "RHBZ#859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0440", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)" }, { "cve": "CVE-2013-0441", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907458" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka \"missing serialization restriction.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing serialization restriction (CORBA, 7201066)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0441" }, { "category": "external", "summary": "RHBZ#907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0441", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0441" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing serialization restriction (CORBA, 7201066)" }, { "cve": "CVE-2013-0442", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906899" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0442" }, { "category": "external", "summary": "RHBZ#906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0442", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)" }, { "cve": "CVE-2013-0443", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907340" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a \"small subgroup attack\" to force the use of weak session keys or obtain sensitive information about the private key.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0443" }, { "category": "external", "summary": "RHBZ#907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0443", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0443" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)" }, { "cve": "CVE-2013-0444", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907218" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient checks for cached results\" by the Java Beans MethodFinder, which might allow attackers to access methods that should only be accessible to privileged code.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MethodFinder insufficient checks for cached results (Beans, 7200493)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0444" }, { "category": "external", "summary": "RHBZ#907218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907218" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0444", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0444" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: MethodFinder insufficient checks for cached results (Beans, 7200493)" }, { "cve": "CVE-2013-0445", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906900" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0445" }, { "category": "external", "summary": "RHBZ#906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0445", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)" }, { "cve": "CVE-2013-0446", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906916" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0446" }, { "category": "external", "summary": "RHBZ#906916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0446", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0446" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0449", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906932" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0449" }, { "category": "external", "summary": "RHBZ#906932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906932" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0449", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0449" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0449", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0449" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u13 (Deployment)" }, { "cve": "CVE-2013-0450", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906911" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of \"access control context\" in the JMX RequiredModelMBean class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0450" }, { "category": "external", "summary": "RHBZ#906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0450", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)" }, { "cve": "CVE-2013-0809", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2013-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "917550" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Specially crafted sample model integer overflow (2D, 8007014)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0809" }, { "category": "external", "summary": "RHBZ#917550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917550" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0809", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0809" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html" } ], "release_date": "2013-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Specially crafted sample model integer overflow (2D, 8007014)" }, { "cve": "CVE-2013-1473", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906933" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect integrity via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1473" }, { "category": "external", "summary": "RHBZ#906933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1473", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-1476", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907457" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via \"certain value handler constructors.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1476" }, { "category": "external", "summary": "RHBZ#907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1476", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)" }, { "cve": "CVE-2013-1478", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906894" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" that can trigger an integer overflow and memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1478" }, { "category": "external", "summary": "RHBZ#906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1478", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)" }, { "cve": "CVE-2013-1480", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906904" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" in awt_parseImage.c, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1480" }, { "category": "external", "summary": "RHBZ#906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1480", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1480" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)" }, { "cve": "CVE-2013-1484", "discovery_date": "2013-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "913021" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MethodHandleProxies insufficient privilege checks (Libraries, 8004937)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1484" }, { "category": "external", "summary": "RHBZ#913021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913021" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1484", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1484" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1484", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1484" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html" } ], "release_date": "2013-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: MethodHandleProxies insufficient privilege checks (Libraries, 8004937)" }, { "cve": "CVE-2013-1485", "discovery_date": "2013-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "913025" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MethodHandles insufficient privilege checks (Libraries, 8006439)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1485" }, { "category": "external", "summary": "RHBZ#913025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913025" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1485", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1485" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1485", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1485" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html" } ], "release_date": "2013-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: MethodHandles insufficient privilege checks (Libraries, 8006439)" }, { "cve": "CVE-2013-1486", "discovery_date": "2013-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "913014" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier, 6 Update 39 and earlier, and 5.0 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1486" }, { "category": "external", "summary": "RHBZ#913014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1486", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1486" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1486", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1486" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html" } ], "release_date": "2013-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446)" }, { "cve": "CVE-2013-1487", "discovery_date": "2013-02-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "913030" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE 7 Update 13 and earlier and 6 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1487" }, { "category": "external", "summary": "RHBZ#913030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913030" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1487", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1487" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1487", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1487" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html" } ], "release_date": "2013-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment)" }, { "cve": "CVE-2013-1493", "discovery_date": "2013-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "917553" } ], "notes": [ { "category": "description", "text": "The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CMM malformed raster memory corruption (2D, 8007675)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1493" }, { "category": "external", "summary": "RHBZ#917553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917553" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1493", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1493" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1493", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1493" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html" } ], "release_date": "2013-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-demo-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-devel-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-jdbc-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-plugin-1:1.7.0.4.0-1jpp.2.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.7.0-ibm-src-1:1.7.0.4.0-1jpp.2.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: CMM malformed raster memory corruption (2D, 8007675)" } ] }
rhsa-2013_0247
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.7.0-openjdk packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "These packages provide the OpenJDK 7 Java Runtime Environment and the\nOpenJDK 7 Software Development Kit.\n\nMultiple improper permission check issues were discovered in the AWT,\nCORBA, JMX, Libraries, and Beans components in OpenJDK. An untrusted Java\napplication or applet could use these flaws to bypass Java sandbox\nrestrictions. (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441, CVE-2013-1475,\nCVE-2013-1476, CVE-2013-0429, CVE-2013-0450, CVE-2013-0425, CVE-2013-0426,\nCVE-2013-0428, CVE-2013-0444)\n\nMultiple flaws were found in the way image parsers in the 2D and AWT\ncomponents handled image raster parameters. A specially-crafted image could\ncause Java Virtual Machine memory corruption and, possibly, lead to\narbitrary code execution with the virtual machine privileges.\n(CVE-2013-1478, CVE-2013-1480)\n\nA flaw was found in the AWT component\u0027s clipboard handling code. An\nuntrusted Java application or applet could use this flaw to access\nclipboard data, bypassing Java sandbox restrictions. (CVE-2013-0432)\n\nThe default Java security properties configuration did not restrict access\nto certain com.sun.xml.internal packages. An untrusted Java application or\napplet could use this flaw to access information, bypassing certain Java\nsandbox restrictions. This update lists the whole package as restricted.\n(CVE-2013-0435)\n\nMultiple improper permission check issues were discovered in the JMX,\nLibraries, Networking, and JAXP components. An untrusted Java application\nor applet could use these flaws to bypass certain Java sandbox\nrestrictions. (CVE-2013-0431, CVE-2013-0427, CVE-2013-0433, CVE-2013-0434)\n\nIt was discovered that the RMI component\u0027s CGIHandler class used user\ninputs in error messages without any sanitization. An attacker could use\nthis flaw to perform a cross-site scripting (XSS) attack. (CVE-2013-0424)\n\nIt was discovered that the SSL/TLS implementation in the JSSE component\ndid not properly enforce handshake message ordering, allowing an unlimited\nnumber of handshake restarts. A remote attacker could use this flaw to\nmake an SSL/TLS server using JSSE consume an excessive amount of CPU by\ncontinuously restarting the handshake. (CVE-2013-0440)\n\nIt was discovered that the JSSE component did not properly validate\nDiffie-Hellman public keys. An SSL/TLS client could possibly use this flaw\nto perform a small subgroup attack. (CVE-2013-0443)\n\nThis erratum also upgrades the OpenJDK package to IcedTea7 2.3.5. Refer to\nthe NEWS file, linked to in the References, for further information.\n\nAll users of java-1.7.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0247", "url": "https://access.redhat.com/errata/RHSA-2013:0247" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://icedtea.classpath.org/hg/release/icedtea7-2.3/file/icedtea-2.3.5/NEWS", "url": "http://icedtea.classpath.org/hg/release/icedtea7-2.3/file/icedtea-2.3.5/NEWS" }, { "category": "external", "summary": "859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "860652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860652" }, { "category": "external", "summary": "906447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906447" }, { "category": "external", "summary": "906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "907218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907218" }, { "category": "external", "summary": "907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "907460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907460" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0247.json" } ], "title": "Red Hat Security Advisory: java-1.7.0-openjdk security update", "tracking": { "current_release_date": "2024-12-08T10:36:51+00:00", "generator": { "date": "2024-12-08T10:36:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2013:0247", "initial_release_date": "2013-02-08T19:20:00+00:00", "revision_history": [ { "date": "2013-02-08T19:20:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-02-08T19:24:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-08T10:36:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "product": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "product_id": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1.7.0.9-2.3.5.3.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "product": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "product_id": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-demo@1.7.0.9-2.3.5.3.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "product": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "product_id": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-javadoc@1.7.0.9-2.3.5.3.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "product": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "product_id": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-devel@1.7.0.9-2.3.5.3.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "product": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "product_id": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-src@1.7.0.9-2.3.5.3.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "product": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "product_id": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-debuginfo@1.7.0.9-2.3.5.3.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "product": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "product_id": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-demo@1.7.0.9-2.3.5.3.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "product": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "product_id": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-src@1.7.0.9-2.3.5.3.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "product": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "product_id": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-debuginfo@1.7.0.9-2.3.5.3.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "product": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "product_id": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1.7.0.9-2.3.5.3.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "product": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "product_id": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-devel@1.7.0.9-2.3.5.3.el6_3?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "product": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "product_id": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1.7.0.9-2.3.5.3.el5_9?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "product": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "product_id": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1.7.0.9-2.3.5.3.el6_3?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "product": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "product_id": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1.7.0.9-2.3.5.3.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "product": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "product_id": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-demo@1.7.0.9-2.3.5.3.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "product": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "product_id": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-javadoc@1.7.0.9-2.3.5.3.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "product": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "product_id": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-devel@1.7.0.9-2.3.5.3.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "product": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "product_id": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-src@1.7.0.9-2.3.5.3.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "product": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "product_id": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-debuginfo@1.7.0.9-2.3.5.3.el5_9?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "product": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "product_id": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-demo@1.7.0.9-2.3.5.3.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "product": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "product_id": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-src@1.7.0.9-2.3.5.3.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "product": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "product_id": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-debuginfo@1.7.0.9-2.3.5.3.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "product": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "product_id": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1.7.0.9-2.3.5.3.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "product": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "product_id": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-devel@1.7.0.9-2.3.5.3.el6_3?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "product": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "product_id": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-javadoc@1.7.0.9-2.3.5.3.el6_3?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386" }, "product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64" }, "product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "relates_to_product_reference": "5Server-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch" }, "product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch" }, "product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch" }, "product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch" }, "product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch" }, "product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch" }, "product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch" }, "product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch" }, "product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "relates_to_product_reference": "6Workstation-optional-6.3.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-0424", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906813" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0424" }, { "category": "external", "summary": "RHBZ#906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0424", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0424" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)" }, { "cve": "CVE-2013-0425", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907344" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0425" }, { "category": "external", "summary": "RHBZ#907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0425", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0425" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)" }, { "cve": "CVE-2013-0426", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907346" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0426" }, { "category": "external", "summary": "RHBZ#907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0426", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0426" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)" }, { "cve": "CVE-2013-0427", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907455" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0427" }, { "category": "external", "summary": "RHBZ#907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)" }, { "cve": "CVE-2013-0428", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907207" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"incorrect checks for proxy classes\" in the Reflection API.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0428" }, { "category": "external", "summary": "RHBZ#907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0428", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)" }, { "cve": "CVE-2013-0429", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907460" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue involves the creation of a single PresentationManager that is shared across multiple thread groups, which allows remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0429" }, { "category": "external", "summary": "RHBZ#907460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907460" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0429", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0429" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0429", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0429" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694)" }, { "cve": "CVE-2013-0431", "discovery_date": "2013-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906447" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows user-assisted remote attackers to bypass the Java security sandbox via unspecified vectors related to JMX, aka \"Issue 52,\" a different vulnerability than CVE-2013-1490.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JMX Introspector missing package access check (JMX, 8000539, SE-2012-01 Issue 52)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0431" }, { "category": "external", "summary": "RHBZ#906447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906447" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0431", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0431" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0431", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0431" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2013-01-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-05-25T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JMX Introspector missing package access check (JMX, 8000539, SE-2012-01 Issue 52)" }, { "cve": "CVE-2013-0432", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907219" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient clipboard access premission checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0432" }, { "category": "external", "summary": "RHBZ#907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0432", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)" }, { "cve": "CVE-2013-0433", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907456" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0433" }, { "category": "external", "summary": "RHBZ#907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0433", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0433" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)" }, { "cve": "CVE-2013-0434", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907453" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0434" }, { "category": "external", "summary": "RHBZ#907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0434", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0434" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)" }, { "cve": "CVE-2013-0435", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906892" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0435" }, { "category": "external", "summary": "RHBZ#906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0435", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)" }, { "cve": "CVE-2013-0440", "discovery_date": "2012-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "859140" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0440" }, { "category": "external", "summary": "RHBZ#859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0440", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)" }, { "cve": "CVE-2013-0441", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907458" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka \"missing serialization restriction.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing serialization restriction (CORBA, 7201066)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0441" }, { "category": "external", "summary": "RHBZ#907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0441", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0441" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing serialization restriction (CORBA, 7201066)" }, { "cve": "CVE-2013-0442", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906899" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0442" }, { "category": "external", "summary": "RHBZ#906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0442", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)" }, { "cve": "CVE-2013-0443", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907340" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a \"small subgroup attack\" to force the use of weak session keys or obtain sensitive information about the private key.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0443" }, { "category": "external", "summary": "RHBZ#907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0443", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0443" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)" }, { "cve": "CVE-2013-0444", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907218" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient checks for cached results\" by the Java Beans MethodFinder, which might allow attackers to access methods that should only be accessible to privileged code.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MethodFinder insufficient checks for cached results (Beans, 7200493)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0444" }, { "category": "external", "summary": "RHBZ#907218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907218" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0444", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0444" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: MethodFinder insufficient checks for cached results (Beans, 7200493)" }, { "cve": "CVE-2013-0445", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906900" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0445" }, { "category": "external", "summary": "RHBZ#906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0445", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)" }, { "cve": "CVE-2013-0450", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906911" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of \"access control context\" in the JMX RequiredModelMBean class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0450" }, { "category": "external", "summary": "RHBZ#906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0450", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)" }, { "cve": "CVE-2013-1475", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "860652" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"IIOP type reuse management\" in ObjectStreamClass.java.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1475" }, { "category": "external", "summary": "RHBZ#860652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1475", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1475" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50)" }, { "cve": "CVE-2013-1476", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907457" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via \"certain value handler constructors.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1476" }, { "category": "external", "summary": "RHBZ#907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1476", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)" }, { "cve": "CVE-2013-1478", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906894" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" that can trigger an integer overflow and memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1478" }, { "category": "external", "summary": "RHBZ#906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1478", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)" }, { "cve": "CVE-2013-1480", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906904" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" in awt_parseImage.c, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1480" }, { "category": "external", "summary": "RHBZ#906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1480", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1480" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:20:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.src", "5Server-5.9.Z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.i386", "5Server-5.9.Z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)" } ] }
rhsa-2013_1456
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Network Satellite Server 5.5.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "This update corrects several security vulnerabilities in the IBM Java\nRuntime Environment shipped as part of Red Hat Network Satellite Server\n5.5. In a typical operating environment, these are of low security risk as\nthe runtime is not used on untrusted applets.\n\nSeveral flaws were fixed in the IBM Java 2 Runtime Environment.\n(CVE-2012-0547, CVE-2012-0551, CVE-2012-1531, CVE-2012-1532, CVE-2012-1533,\nCVE-2012-1541, CVE-2012-1682, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717,\nCVE-2012-1718, CVE-2012-1719, CVE-2012-1721, CVE-2012-1722, CVE-2012-1725,\nCVE-2012-3143, CVE-2012-3159, CVE-2012-3213, CVE-2012-3216, CVE-2012-3342,\nCVE-2012-4820, CVE-2012-4822, CVE-2012-4823, CVE-2012-5068, CVE-2012-5069,\nCVE-2012-5071, CVE-2012-5072, CVE-2012-5073, CVE-2012-5075, CVE-2012-5079,\nCVE-2012-5081, CVE-2012-5083, CVE-2012-5084, CVE-2012-5089, CVE-2013-0169,\nCVE-2013-0351, CVE-2013-0401, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423,\nCVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428,\nCVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0438,\nCVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0445,\nCVE-2013-0446, CVE-2013-0450, CVE-2013-0809, CVE-2013-1473, CVE-2013-1476,\nCVE-2013-1478, CVE-2013-1480, CVE-2013-1481, CVE-2013-1486, CVE-2013-1487,\nCVE-2013-1491, CVE-2013-1493, CVE-2013-1500, CVE-2013-1537, CVE-2013-1540,\nCVE-2013-1557, CVE-2013-1563, CVE-2013-1569, CVE-2013-1571, CVE-2013-2383,\nCVE-2013-2384, CVE-2013-2394, CVE-2013-2407, CVE-2013-2412, CVE-2013-2417,\nCVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2422, CVE-2013-2424,\nCVE-2013-2429, CVE-2013-2430, CVE-2013-2432, CVE-2013-2433, CVE-2013-2435,\nCVE-2013-2437, CVE-2013-2440, CVE-2013-2442, CVE-2013-2443, CVE-2013-2444,\nCVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2450, CVE-2013-2451,\nCVE-2013-2452, CVE-2013-2453, CVE-2013-2454, CVE-2013-2455, CVE-2013-2456,\nCVE-2013-2457, CVE-2013-2459, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465,\nCVE-2013-2466, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471,\nCVE-2013-2472, CVE-2013-2473, CVE-2013-3743)\n\nUsers of Red Hat Network Satellite Server 5.5 are advised to upgrade to\nthese updated packages, which contain the IBM Java SE 6 SR14 release. For\nthis update to take effect, Red Hat Network Satellite Server must be\nrestarted (\"/usr/sbin/rhn-satellite restart\"), as well as all running\ninstances of IBM Java.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1456", "url": "https://access.redhat.com/errata/RHSA-2013:1456" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "829358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358" }, { "category": "external", "summary": "829360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360" }, { "category": "external", "summary": "829361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361" }, { "category": "external", "summary": "829371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371" }, { "category": "external", "summary": "829372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372" }, { "category": "external", "summary": "829376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376" }, { "category": "external", "summary": "831353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353" }, { "category": "external", "summary": "831354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354" }, { "category": "external", "summary": "831355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355" }, { "category": "external", "summary": "853097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853097" }, { "category": "external", "summary": "853228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853228" }, { "category": "external", "summary": "859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "865346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865346" }, { "category": "external", "summary": "865348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865348" }, { "category": "external", "summary": "865357", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865357" }, { "category": "external", "summary": "865363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865363" }, { "category": "external", "summary": "865365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865365" }, { "category": "external", "summary": "865370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865370" }, { "category": "external", "summary": "865511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865511" }, { "category": "external", "summary": "865514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865514" }, { "category": "external", "summary": "865519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865519" }, { "category": "external", "summary": "865531", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865531" }, { "category": "external", "summary": "865568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865568" }, { "category": "external", "summary": "867185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867185" }, { "category": "external", "summary": "867186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867186" }, { "category": "external", "summary": "867187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867187" }, { "category": "external", "summary": "867189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867189" }, { "category": "external", "summary": "867190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867190" }, { "category": "external", "summary": "867193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867193" }, { "category": "external", "summary": "876386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876386" }, { "category": "external", "summary": "876388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876388" }, { "category": "external", "summary": "876389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876389" }, { "category": "external", "summary": "906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "906914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914" }, { "category": "external", "summary": "906916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916" }, { "category": "external", "summary": "906917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917" }, { "category": "external", "summary": "906918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918" }, { "category": "external", "summary": "906921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921" }, { "category": "external", "summary": "906923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923" }, { "category": "external", "summary": "906933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933" }, { "category": "external", "summary": "906935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935" }, { "category": "external", "summary": "907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "907223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223" }, { "category": "external", "summary": "907224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224" }, { "category": "external", "summary": "907226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226" }, { "category": "external", "summary": "907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "907589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589" }, { "category": "external", "summary": "913014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913014" }, { "category": "external", "summary": "913030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913030" }, { "category": "external", "summary": "917550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917550" }, { "category": "external", "summary": "917553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917553" }, { "category": "external", "summary": "920245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=920245" }, { "category": "external", "summary": "920248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=920248" }, { "category": "external", "summary": "952387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952387" }, { "category": "external", "summary": "952509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952509" }, { "category": "external", "summary": "952521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952521" }, { "category": "external", "summary": "952524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952524" }, { "category": "external", "summary": "952638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952638" }, { "category": "external", "summary": "952642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952642" }, { "category": "external", "summary": "952648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952648" }, { "category": "external", "summary": "952656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952656" }, { "category": "external", "summary": "952657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952657" }, { "category": "external", "summary": "952708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952708" }, { "category": "external", "summary": "952709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952709" }, { "category": "external", "summary": "952711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952711" }, { "category": "external", "summary": "953166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953166" }, { "category": "external", "summary": "953172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953172" }, { "category": "external", "summary": "953265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953265" }, { "category": "external", "summary": "953267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953267" }, { "category": "external", "summary": "953269", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953269" }, { "category": "external", "summary": "953270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953270" }, { "category": "external", "summary": "953273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953273" }, { "category": "external", "summary": "953275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953275" }, { "category": "external", "summary": "973474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=973474" }, { "category": "external", "summary": "975099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975099" }, { "category": "external", "summary": "975102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975102" }, { "category": "external", "summary": "975107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975107" }, { "category": "external", "summary": "975110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975110" }, { "category": "external", "summary": "975115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975115" }, { "category": "external", "summary": "975118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975118" }, { "category": "external", "summary": "975120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975120" }, { "category": "external", "summary": "975121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975121" }, { "category": "external", "summary": "975125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975125" }, { "category": "external", "summary": "975127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975127" }, { "category": "external", "summary": "975129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975129" }, { "category": "external", "summary": "975131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975131" }, { "category": "external", "summary": "975132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975132" }, { "category": "external", "summary": "975133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975133" }, { "category": "external", "summary": "975134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975134" }, { "category": "external", "summary": "975137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975137" }, { "category": "external", "summary": "975138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975138" }, { "category": "external", "summary": "975139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975139" }, { "category": "external", "summary": "975140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975140" }, { "category": "external", "summary": "975141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975141" }, { "category": "external", "summary": "975142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975142" }, { "category": "external", "summary": "975144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975144" }, { "category": "external", "summary": "975146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975146" }, { "category": "external", "summary": "975148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975148" }, { "category": "external", "summary": "975757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975757" }, { "category": "external", "summary": "975761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975761" }, { "category": "external", "summary": "975764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975764" }, { "category": "external", "summary": "975767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975767" }, { "category": "external", "summary": "975770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975770" }, { "category": "external", "summary": "975773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975773" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1456.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update", "tracking": { "current_release_date": "2024-12-08T10:38:43+00:00", "generator": { "date": "2024-12-08T10:38:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2013:1456", "initial_release_date": "2013-10-23T16:26:00+00:00", "revision_history": [ { "date": "2013-10-23T16:26:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-10-23T16:29:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-08T10:38:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.5 (RHEL v.5)", "product": { "name": "Red Hat Satellite 5.5 (RHEL v.5)", "product_id": "5Server-Satellite55", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.5::el5" } } }, { "category": "product_name", "name": "Red Hat Satellite 5.5 (RHEL v.6)", "product": { "name": "Red Hat Satellite 5.5 (RHEL v.6)", "product_id": "6Server-Satellite55", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.5::el6" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el6_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el6_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x as a component of Red Hat Satellite 5.5 (RHEL v.5)", "product_id": "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "relates_to_product_reference": "5Server-Satellite55" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src as a component of Red Hat Satellite 5.5 (RHEL v.5)", "product_id": "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "relates_to_product_reference": "5Server-Satellite55" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64 as a component of Red Hat Satellite 5.5 (RHEL v.5)", "product_id": "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "relates_to_product_reference": "5Server-Satellite55" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x as a component of Red Hat Satellite 5.5 (RHEL v.5)", "product_id": "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "relates_to_product_reference": "5Server-Satellite55" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64 as a component of Red Hat Satellite 5.5 (RHEL v.5)", "product_id": "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "relates_to_product_reference": "5Server-Satellite55" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x as a component of Red Hat Satellite 5.5 (RHEL v.6)", "product_id": "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "relates_to_product_reference": "6Server-Satellite55" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src as a component of Red Hat Satellite 5.5 (RHEL v.6)", "product_id": "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "relates_to_product_reference": "6Server-Satellite55" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64 as a component of Red Hat Satellite 5.5 (RHEL v.6)", "product_id": "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "relates_to_product_reference": "6Server-Satellite55" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x as a component of Red Hat Satellite 5.5 (RHEL v.6)", "product_id": "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "relates_to_product_reference": "6Server-Satellite55" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64 as a component of Red Hat Satellite 5.5 (RHEL v.6)", "product_id": "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "relates_to_product_reference": "6Server-Satellite55" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-0547", "discovery_date": "2012-08-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "853228" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier, and 6 Update 34 and earlier, has no impact and remote attack vectors involving AWT and \"a security-in-depth issue that is not directly exploitable but which can be used to aggravate security vulnerabilities that can be directly exploited.\" NOTE: this identifier was assigned by the Oracle CNA, but CVE is not intended to cover defense-in-depth issues that are only exposed by the presence of other vulnerabilities. NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to \"toolkit internals references.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AWT hardening fixes (AWT, 7163201)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0547" }, { "category": "external", "summary": "RHBZ#853228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853228" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0547", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0547" } ], "release_date": "2012-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: AWT hardening fixes (AWT, 7163201)" }, { "cve": "CVE-2012-0551", "discovery_date": "2012-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "831355" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE 7 update 4 and earlier and 6 update 32 and earlier, and the GlassFish Enterprise Server component in Oracle Sun Products Suite GlassFish Enterprise Server 3.1.1, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Web Container or Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0551" }, { "category": "external", "summary": "RHBZ#831355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0551", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0551" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)" }, { "cve": "CVE-2012-1531", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867185" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier; and JavaFX 2.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1531" }, { "category": "external", "summary": "RHBZ#867185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867185" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1531", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1531" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1531", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1531" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (2D)" }, { "cve": "CVE-2012-1532", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867186" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier and 6 Update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1532" }, { "category": "external", "summary": "RHBZ#867186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867186" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1532", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1532" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1532", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1532" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (Deployment)" }, { "cve": "CVE-2012-1533", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867187" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-3159.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1533" }, { "category": "external", "summary": "RHBZ#867187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867187" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1533", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1533" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1533", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1533" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (Deployment)" }, { "cve": "CVE-2012-1541", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906914" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1541" }, { "category": "external", "summary": "RHBZ#906914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1541", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2012-1682", "discovery_date": "2012-08-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "853097" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-3136. NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to \"XMLDecoder security issue via ClassFinder.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1682" }, { "category": "external", "summary": "RHBZ#853097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853097" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1682", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1682" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1682", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1682" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html" } ], "release_date": "2012-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476)" }, { "cve": "CVE-2012-1713", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829361" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, 1.4.2_37 and earlier, and JavaFX 2.1 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1713" }, { "category": "external", "summary": "RHBZ#829361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1713", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1713" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)" }, { "cve": "CVE-2012-1716", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829360" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1716" }, { "category": "external", "summary": "RHBZ#829360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1716", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)" }, { "cve": "CVE-2012-1717", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829358" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insecure temporary file permissions (JRE, 7143606)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1717" }, { "category": "external", "summary": "RHBZ#829358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1717", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: insecure temporary file permissions (JRE, 7143606)" }, { "cve": "CVE-2012-1718", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829372" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect availability via unknown vectors related to Security.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1718" }, { "category": "external", "summary": "RHBZ#829372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1718", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)" }, { "cve": "CVE-2012-1719", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829371" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect integrity, related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1719" }, { "category": "external", "summary": "RHBZ#829371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1719", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)" }, { "cve": "CVE-2012-1721", "discovery_date": "2012-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "831353" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1722.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1721" }, { "category": "external", "summary": "RHBZ#831353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1721", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1721" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)" }, { "cve": "CVE-2012-1722", "discovery_date": "2012-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "831354" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1721.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1722" }, { "category": "external", "summary": "RHBZ#831354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1722", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1722" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1722", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1722" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)" }, { "cve": "CVE-2012-1725", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829376" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1725" }, { "category": "external", "summary": "RHBZ#829376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1725", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1725" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)" }, { "cve": "CVE-2012-3143", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867189" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-5089.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (JMX)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3143" }, { "category": "external", "summary": "RHBZ#867189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867189" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3143", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3143" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (JMX)" }, { "cve": "CVE-2012-3159", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867190" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1533.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3159" }, { "category": "external", "summary": "RHBZ#867190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3159", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3159" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3159", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3159" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability (Deployment)" }, { "cve": "CVE-2012-3213", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907223" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3213" }, { "category": "external", "summary": "RHBZ#907223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3213", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)" }, { "cve": "CVE-2012-3216", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865346" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: java.io.FilePermission information leak (Libraries, 6631398)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3216" }, { "category": "external", "summary": "RHBZ#865346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865346" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3216", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3216" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3216", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3216" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: java.io.FilePermission information leak (Libraries, 6631398)" }, { "cve": "CVE-2012-3342", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906917" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3342" }, { "category": "external", "summary": "RHBZ#906917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3342", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2012-4820", "discovery_date": "2012-11-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "876386" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, when running under a security manager, allows remote attackers to gain privileges by modifying or removing the security manager via vectors related to \"insecure use of the java.lang.reflect.Method invoke() method.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: java.lang.reflect.Method invoke() code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4820" }, { "category": "external", "summary": "RHBZ#876386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4820", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4820" }, { "category": "external", "summary": "http://xforce.iss.net/xforce/xfdb/78764", "url": "http://xforce.iss.net/xforce/xfdb/78764" } ], "release_date": "2012-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: java.lang.reflect.Method invoke() code execution" }, { "cve": "CVE-2012-4822", "discovery_date": "2012-11-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "876388" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, allow remote attackers to execute arbitrary code via vectors related to \"insecure use [of] multiple methods in the java.lang.class class.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: java.lang.class code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4822" }, { "category": "external", "summary": "RHBZ#876388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4822", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4822" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4822", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4822" }, { "category": "external", "summary": "http://xforce.iss.net/xforce/xfdb/78766", "url": "http://xforce.iss.net/xforce/xfdb/78766" } ], "release_date": "2012-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: java.lang.class code execution" }, { "cve": "CVE-2012-4823", "discovery_date": "2012-11-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "876389" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, allows remote attackers to execute arbitrary code via vectors related to \"insecure use of the java.lang.ClassLoder defineClass() method.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: java.lang.ClassLoder defineClass() code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4823" }, { "category": "external", "summary": "RHBZ#876389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4823", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4823" }, { "category": "external", "summary": "http://xforce.iss.net/xforce/xfdb/78767", "url": "http://xforce.iss.net/xforce/xfdb/78767" } ], "release_date": "2012-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: java.lang.ClassLoder defineClass() code execution" }, { "cve": "CVE-2012-5068", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865348" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5068" }, { "category": "external", "summary": "RHBZ#865348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865348" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5068", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5068" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535)" }, { "cve": "CVE-2012-5069", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865531" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Concurrency.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Executors state handling issues (Concurrency, 7189103)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5069" }, { "category": "external", "summary": "RHBZ#865531", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865531" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5069", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5069" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5069", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5069" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: Executors state handling issues (Concurrency, 7189103)" }, { "cve": "CVE-2012-5071", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865519" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity, related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5071" }, { "category": "external", "summary": "RHBZ#865519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865519" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5071", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5071" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5071", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5071" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975)" }, { "cve": "CVE-2012-5072", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865365" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality via unknown vectors related to Security.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5072" }, { "category": "external", "summary": "RHBZ#865365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865365" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5072", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5072" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522)" }, { "cve": "CVE-2012-5073", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865357" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5079.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: LogManager security bypass (Libraries, 7169884)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5073" }, { "category": "external", "summary": "RHBZ#865357", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865357" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5073", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5073" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: LogManager security bypass (Libraries, 7169884)" }, { "cve": "CVE-2012-5075", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865363" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5075" }, { "category": "external", "summary": "RHBZ#865363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865363" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5075", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5075" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5075", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5075" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888)" }, { "cve": "CVE-2012-5079", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865568" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5073.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5079" }, { "category": "external", "summary": "RHBZ#865568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865568" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5079", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5079" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919)" }, { "cve": "CVE-2012-5081", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865370" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect availability, related to JSSE.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JSSE denial of service (JSSE, 7186286)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5081" }, { "category": "external", "summary": "RHBZ#865370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865370" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5081", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5081" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JSSE denial of service (JSSE, 7186286)" }, { "cve": "CVE-2012-5083", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867193" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, 1.4.2_38 and earlier, and JavaFX 2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5083" }, { "category": "external", "summary": "RHBZ#867193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867193" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5083", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5083" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5083", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5083" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (2D)" }, { "cve": "CVE-2012-5084", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865511" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5084" }, { "category": "external", "summary": "RHBZ#865511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865511" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5084", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5084" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5084", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5084" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194)" }, { "cve": "CVE-2012-5089", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865514" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-3143.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5089" }, { "category": "external", "summary": "RHBZ#865514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865514" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5089", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5089" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5089", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5089" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)" }, { "cve": "CVE-2013-0169", "discovery_date": "2013-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907589" } ], "notes": [ { "category": "description", "text": "The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the \"Lucky Thirteen\" issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "SSL/TLS: CBC padding timing attack (lucky-13)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0169" }, { "category": "external", "summary": "RHBZ#907589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0169", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169" }, { "category": "external", "summary": "http://www.isg.rhul.ac.uk/tls/", "url": "http://www.isg.rhul.ac.uk/tls/" }, { "category": "external", "summary": "http://www.openssl.org/news/secadv_20130205.txt", "url": "http://www.openssl.org/news/secadv_20130205.txt" }, { "category": "external", "summary": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released", "url": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released" } ], "release_date": "2013-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" }, { "category": "workaround", "details": "On OpenShift Container Platform 3.11 it\u0027s possible to edit the list of cipher suites offered by the router when performing \u0027edge\u0027, or \u0027re-encrypt\u0027 TLS modes. Please follow the documentation [1], and [2] to remove the vulnerable CBC ciphers use the modern, or intermediate cipher suites outlined by Mozilla instead [3]. In \u0027passthrough\u0027 mode TLS termination occurs in the application so that is another way to mitigate the vulnerability.\n[1] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#obtaining-router-configuration-template\n[2] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#using-configmap-replace-template\n[3] https://wiki.mozilla.org/Security/Server_Side_TLS", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "SSL/TLS: CBC padding timing attack (lucky-13)" }, { "cve": "CVE-2013-0351", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906923" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0351" }, { "category": "external", "summary": "RHBZ#906923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0351", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0401", "discovery_date": "2013-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "920245" } ], "notes": [ { "category": "description", "text": "The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to execute arbitrary code via vectors related to AWT, as demonstrated by Ben Murphy during a Pwn2Own competition at CanSecWest 2013. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to invocation of the system class loader by the sun.awt.datatransfer.ClassLoaderObjectInputStream class, which allows remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0401" }, { "category": "external", "summary": "RHBZ#920245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=920245" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0401", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0401" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0401", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0401" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305)" }, { "cve": "CVE-2013-0409", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907226" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38 allows remote attackers to affect confidentiality via vectors related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0409" }, { "category": "external", "summary": "RHBZ#907226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0409", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0409" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)" }, { "cve": "CVE-2013-0419", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906918" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0419" }, { "category": "external", "summary": "RHBZ#906918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0419", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0423", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906921" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0423" }, { "category": "external", "summary": "RHBZ#906921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0423", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0424", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906813" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0424" }, { "category": "external", "summary": "RHBZ#906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0424", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0424" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)" }, { "cve": "CVE-2013-0425", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907344" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0425" }, { "category": "external", "summary": "RHBZ#907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0425", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0425" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)" }, { "cve": "CVE-2013-0426", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907346" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0426" }, { "category": "external", "summary": "RHBZ#907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0426", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0426" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)" }, { "cve": "CVE-2013-0427", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907455" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0427" }, { "category": "external", "summary": "RHBZ#907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)" }, { "cve": "CVE-2013-0428", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907207" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"incorrect checks for proxy classes\" in the Reflection API.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0428" }, { "category": "external", "summary": "RHBZ#907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0428", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)" }, { "cve": "CVE-2013-0432", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907219" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient clipboard access premission checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0432" }, { "category": "external", "summary": "RHBZ#907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0432", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)" }, { "cve": "CVE-2013-0433", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907456" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0433" }, { "category": "external", "summary": "RHBZ#907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0433", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0433" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)" }, { "cve": "CVE-2013-0434", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907453" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0434" }, { "category": "external", "summary": "RHBZ#907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0434", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0434" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)" }, { "cve": "CVE-2013-0435", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906892" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0435" }, { "category": "external", "summary": "RHBZ#906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0435", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)" }, { "cve": "CVE-2013-0438", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906935" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0438" }, { "category": "external", "summary": "RHBZ#906935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0438", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0438" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0440", "discovery_date": "2012-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "859140" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0440" }, { "category": "external", "summary": "RHBZ#859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0440", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)" }, { "cve": "CVE-2013-0441", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907458" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka \"missing serialization restriction.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing serialization restriction (CORBA, 7201066)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0441" }, { "category": "external", "summary": "RHBZ#907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0441", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0441" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing serialization restriction (CORBA, 7201066)" }, { "cve": "CVE-2013-0442", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906899" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0442" }, { "category": "external", "summary": "RHBZ#906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0442", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)" }, { "cve": "CVE-2013-0443", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907340" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a \"small subgroup attack\" to force the use of weak session keys or obtain sensitive information about the private key.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0443" }, { "category": "external", "summary": "RHBZ#907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0443", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0443" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)" }, { "cve": "CVE-2013-0445", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906900" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0445" }, { "category": "external", "summary": "RHBZ#906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0445", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)" }, { "cve": "CVE-2013-0446", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906916" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0446" }, { "category": "external", "summary": "RHBZ#906916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0446", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0446" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0450", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906911" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of \"access control context\" in the JMX RequiredModelMBean class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0450" }, { "category": "external", "summary": "RHBZ#906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0450", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)" }, { "cve": "CVE-2013-0809", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2013-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "917550" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Specially crafted sample model integer overflow (2D, 8007014)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0809" }, { "category": "external", "summary": "RHBZ#917550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917550" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0809", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0809" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html" } ], "release_date": "2013-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Specially crafted sample model integer overflow (2D, 8007014)" }, { "cve": "CVE-2013-1473", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906933" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect integrity via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1473" }, { "category": "external", "summary": "RHBZ#906933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1473", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-1476", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907457" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via \"certain value handler constructors.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1476" }, { "category": "external", "summary": "RHBZ#907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1476", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)" }, { "cve": "CVE-2013-1478", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906894" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" that can trigger an integer overflow and memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1478" }, { "category": "external", "summary": "RHBZ#906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1478", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)" }, { "cve": "CVE-2013-1480", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906904" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" in awt_parseImage.c, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1480" }, { "category": "external", "summary": "RHBZ#906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1480", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1480" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)" }, { "cve": "CVE-2013-1481", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907224" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 (Sound)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1481" }, { "category": "external", "summary": "RHBZ#907224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1481", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1481" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 (Sound)" }, { "cve": "CVE-2013-1486", "discovery_date": "2013-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "913014" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier, 6 Update 39 and earlier, and 5.0 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1486" }, { "category": "external", "summary": "RHBZ#913014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1486", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1486" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1486", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1486" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html" } ], "release_date": "2013-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446)" }, { "cve": "CVE-2013-1487", "discovery_date": "2013-02-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "913030" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE 7 Update 13 and earlier and 6 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1487" }, { "category": "external", "summary": "RHBZ#913030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913030" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1487", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1487" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1487", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1487" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html" } ], "release_date": "2013-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment)" }, { "cve": "CVE-2013-1491", "discovery_date": "2013-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "920248" } ], "notes": [ { "category": "description", "text": "The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to execute arbitrary code via vectors related to 2D, as demonstrated by Joshua Drake during a Pwn2Own competition at CanSecWest 2013.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified sanbox bypass (CanSecWest 2013, 2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1491" }, { "category": "external", "summary": "RHBZ#920248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=920248" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1491", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1491" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1491", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1491" } ], "release_date": "2013-03-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified sanbox bypass (CanSecWest 2013, 2D)" }, { "cve": "CVE-2013-1493", "discovery_date": "2013-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "917553" } ], "notes": [ { "category": "description", "text": "The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CMM malformed raster memory corruption (2D, 8007675)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1493" }, { "category": "external", "summary": "RHBZ#917553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917553" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1493", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1493" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1493", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1493" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html" } ], "release_date": "2013-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: CMM malformed raster memory corruption (2D, 8007675)" }, { "acknowledgments": [ { "names": [ "Tim Brown" ] } ], "cve": "CVE-2013-1500", "discovery_date": "2013-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975148" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality and integrity via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to weak permissions for shared memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Insecure shared memory permissions (2D, 8001034)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1500" }, { "category": "external", "summary": "RHBZ#975148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975148" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1500", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1500" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1500", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1500" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: Insecure shared memory permissions (2D, 8001034)" }, { "cve": "CVE-2013-1537", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952387" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the default java.rmi.server.useCodebaseOnly setting of false, which allows remote attackers to perform \"dynamic class downloading\" and execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: remote code loading enabled by default (RMI, 8001040)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1537" }, { "category": "external", "summary": "RHBZ#952387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952387" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1537", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1537" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: remote code loading enabled by default (RMI, 8001040)" }, { "cve": "CVE-2013-1540", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953166" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2433.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1540" }, { "category": "external", "summary": "RHBZ#953166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1540", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1540" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-1557", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952648" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"missing security restrictions\" in the LogStream.setDefaultStream method.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1557" }, { "category": "external", "summary": "RHBZ#952648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952648" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1557", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1557" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329)" }, { "cve": "CVE-2013-1563", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953172" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1563" }, { "category": "external", "summary": "RHBZ#953172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953172" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1563", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1563" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install)" }, { "cve": "CVE-2013-1569", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952711" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"checking of [a] glyph table\" in the International Components for Unicode (ICU) Layout Engine before 51.2.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1569" }, { "category": "external", "summary": "RHBZ#952711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952711" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1569", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1569" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1569", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1569" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994)" }, { "acknowledgments": [ { "names": [ "US-CERT" ] } ], "cve": "CVE-2013-1571", "discovery_date": "2013-06-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "973474" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Javadoc component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Javadoc. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to frame injection in HTML that is generated by Javadoc.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Frame injection in generated HTML (Javadoc, 8012375)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1571" }, { "category": "external", "summary": "RHBZ#973474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=973474" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1571", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1571" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1571", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1571" }, { "category": "external", "summary": "http://www.kb.cert.org/vuls/id/225657", "url": "http://www.kb.cert.org/vuls/id/225657" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Frame injection in generated HTML (Javadoc, 8012375)" }, { "cve": "CVE-2013-2383", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952708" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2384, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"handling of [a] glyph table\" in the International Components for Unicode (ICU) Layout Engine before 51.2.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2383" }, { "category": "external", "summary": "RHBZ#952708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952708" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2383", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2383" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2383", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2383" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986)" }, { "cve": "CVE-2013-2384", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952709" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2383, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"font layout\" in the International Components for Unicode (ICU) Layout Engine before 51.2.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2384" }, { "category": "external", "summary": "RHBZ#952709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952709" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2384", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2384" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987)" }, { "cve": "CVE-2013-2394", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953265" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2432 and CVE-2013-1491.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2394" }, { "category": "external", "summary": "RHBZ#953265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953265" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2394", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2394" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2394", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2394" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)" }, { "cve": "CVE-2013-2407", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975127" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and availability via unknown vectors related to Libraries. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"XML security and the class loader.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2407" }, { "category": "external", "summary": "RHBZ#975127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975127" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2407", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2407" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2407", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2407" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744)" }, { "cve": "CVE-2013-2412", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975144" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serviceability. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient indication of an SSL connection failure by JConsole, related to RMI connection dialog box.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JConsole SSL support (Serviceability, 8003703)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2412" }, { "category": "external", "summary": "RHBZ#975144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975144" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2412", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2412" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2412", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2412" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JConsole SSL support (Serviceability, 8003703)" }, { "cve": "CVE-2013-2417", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952657" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to Networking. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an information leak involving InetAddress serialization. CVE has not investigated the apparent discrepancy between vendor reports regarding the impact of this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2417" }, { "category": "external", "summary": "RHBZ#952657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952657" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2417", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2417" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2417", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2417" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724)" }, { "cve": "CVE-2013-2418", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953267" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2418" }, { "category": "external", "summary": "RHBZ#953267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953267" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2418", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2418" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2418", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2418" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-2419", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952656" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"font processing errors\" in the International Components for Unicode (ICU) Layout Engine before 51.2.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Layout Engine font processing errors (JDK 2D, 8001031)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2419" }, { "category": "external", "summary": "RHBZ#952656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2419", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2419" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ICU: Layout Engine font processing errors (JDK 2D, 8001031)" }, { "cve": "CVE-2013-2420", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952638" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient \"validation of images\" in share/native/sun/awt/image/awt_ImageRep.c, possibly involving offsets.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image processing vulnerability (2D, 8007617)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2420" }, { "category": "external", "summary": "RHBZ#952638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952638" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2420", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2420" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2420", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2420" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image processing vulnerability (2D, 8007617)" }, { "cve": "CVE-2013-2422", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952642" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper method-invocation restrictions by the MethodUtil trampoline class, which allows remote attackers to bypass the Java sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2422" }, { "category": "external", "summary": "RHBZ#952642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952642" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2422", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2422" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857)" }, { "cve": "CVE-2013-2424", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952509" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality via vectors related to JMX. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient class access checks\" when \"creating new instances\" using MBeanInstantiator.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2424" }, { "category": "external", "summary": "RHBZ#952509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2424", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2424" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2424", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2424" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435)" }, { "cve": "CVE-2013-2429", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952521" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"JPEGImageWriter state corruption\" when using native code, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2429" }, { "category": "external", "summary": "RHBZ#952521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2429", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2429" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2429", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2429" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918)" }, { "cve": "CVE-2013-2430", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952524" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; JavaFX 2.2.7 and earlier; and OpenJDK 6 and 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"JPEGImageReader state corruption\" when using native code.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2430" }, { "category": "external", "summary": "RHBZ#952524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2430", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2430" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2430", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2430" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667)" }, { "cve": "CVE-2013-2432", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953269" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2394 and CVE-2013-1491.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2432" }, { "category": "external", "summary": "RHBZ#953269", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953269" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2432", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2432" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)" }, { "cve": "CVE-2013-2433", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953270" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-1540.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2433" }, { "category": "external", "summary": "RHBZ#953270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953270" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2433", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2433" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2433", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2433" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-2435", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953273" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2440.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2435" }, { "category": "external", "summary": "RHBZ#953273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953273" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2435", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2435" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-2437", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975773" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2437" }, { "category": "external", "summary": "RHBZ#975773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975773" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2437", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2437" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)" }, { "cve": "CVE-2013-2440", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953275" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2435.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2440" }, { "category": "external", "summary": "RHBZ#953275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953275" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2440", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2440" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-2442", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975770" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2466 and CVE-2013-2468.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2442" }, { "category": "external", "summary": "RHBZ#975770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2442", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2442" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)" }, { "cve": "CVE-2013-2443", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975137" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2452 and CVE-2013-2455. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect \"checking order\" within the AccessControlContext class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AccessControlContext check order issue (Libraries, 8001330)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2443" }, { "category": "external", "summary": "RHBZ#975137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975137" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2443", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2443" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2443", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2443" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: AccessControlContext check order issue (Libraries, 8001330)" }, { "cve": "CVE-2013-2444", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975131" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect availability via vectors related to AWT. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not \"properly manage and restrict certain resources related to the processing of fonts,\" possibly involving temporary files.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Resource denial of service (AWT, 8001038)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2444" }, { "category": "external", "summary": "RHBZ#975131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975131" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2444", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2444" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Resource denial of service (AWT, 8001038)" }, { "cve": "CVE-2013-2446", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975132" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via vectors related to CORBA. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly enforce access restrictions for CORBA output streams.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: output stream access restrictions (CORBA, 8000642)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2446" }, { "category": "external", "summary": "RHBZ#975132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975132" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2446", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2446" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2446", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2446" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: output stream access restrictions (CORBA, 8000642)" }, { "cve": "CVE-2013-2447", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975140" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Networking. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to obtain a socket\u0027s local address via vectors involving inconsistencies between Socket.getLocalAddress and InetAddress.getLocalHost.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Prevent revealing the local address (Networking, 8001318)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2447" }, { "category": "external", "summary": "RHBZ#975140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2447", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2447" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2447", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2447" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Prevent revealing the local address (Networking, 8001318)" }, { "cve": "CVE-2013-2448", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975125" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to insufficient \"access restrictions\" and \"robustness of sound classes.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Better access restrictions (Sound, 8006328)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2448" }, { "category": "external", "summary": "RHBZ#975125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2448", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2448" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2448", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2448" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Better access restrictions (Sound, 8006328)" }, { "cve": "CVE-2013-2450", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975141" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Serialization. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper handling of circular references in ObjectStreamClass.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2450" }, { "category": "external", "summary": "RHBZ#975141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2450", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2450" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638)" }, { "cve": "CVE-2013-2451", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975146" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Networking. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper enforcement of exclusive port binds when running on Windows, which allows attackers to bind to ports that are already in use.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: exclusive port binding (Networking, 7170730)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2451" }, { "category": "external", "summary": "RHBZ#975146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975146" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2451", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2451" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2451", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2451" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: exclusive port binding (Networking, 7170730)" }, { "cve": "CVE-2013-2452", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975138" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2455. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"network address handling in virtual machine identifiers\" and the lack of \"unique and unpredictable IDs\" in the java.rmi.dgc.VMID class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Unique VMIDs (Libraries, 8001033)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2452" }, { "category": "external", "summary": "RHBZ#975138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975138" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2452", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2452" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2452", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2452" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Unique VMIDs (Libraries, 8001033)" }, { "cve": "CVE-2013-2453", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975134" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect integrity via vectors related to JMX. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to a missing check for \"package access\" by the MBeanServer Introspector.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MBeanServer Introspector package access (JMX, 8008124)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2453" }, { "category": "external", "summary": "RHBZ#975134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975134" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2453", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2453" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2453", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2453" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: MBeanServer Introspector package access (JMX, 8008124)" }, { "cve": "CVE-2013-2454", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975129" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via vectors related to JDBC. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly restrict access to certain class packages in the SerialJavaObject class, which allows remote attackers to bypass the Java sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: SerialJavaObject package restriction (JDBC, 8009554)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2454" }, { "category": "external", "summary": "RHBZ#975129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975129" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2454", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2454" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2454", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2454" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: SerialJavaObject package restriction (JDBC, 8009554)" }, { "cve": "CVE-2013-2455", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975139" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2452. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect access checks by the (1) getEnclosingClass, (2) getEnclosingMethod, and (3) getEnclosingConstructor methods.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: getEnclosing* checks (Libraries, 8007812)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2455" }, { "category": "external", "summary": "RHBZ#975139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975139" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2455", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2455" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2455", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2455" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: getEnclosing* checks (Libraries, 8007812)" }, { "cve": "CVE-2013-2456", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975142" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serialization. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper access checks for subclasses in the ObjectOutputStream class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: ObjectOutputStream access checks (Serialization, 8008132)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2456" }, { "category": "external", "summary": "RHBZ#975142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2456", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2456" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2456", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2456" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: ObjectOutputStream access checks (Serialization, 8008132)" }, { "cve": "CVE-2013-2457", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975133" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to JMX. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect implementation of \"certain class checks\" that allows remote attackers to bypass intended class restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Proper class checking (JMX, 8008120)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2457" }, { "category": "external", "summary": "RHBZ#975133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975133" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2457", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2457" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2457", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2457" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Proper class checking (JMX, 8008120)" }, { "cve": "CVE-2013-2459", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975121" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"integer overflow checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Various AWT integer overflow checks (AWT, 8009071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2459" }, { "category": "external", "summary": "RHBZ#975121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2459", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2459" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2459", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2459" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Various AWT integer overflow checks (AWT, 8009071)" }, { "cve": "CVE-2013-2463", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975115" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image attribute verification\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect image attribute verification (2D, 8012438)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2463" }, { "category": "external", "summary": "RHBZ#975115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975115" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2463", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2463" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2463", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2463" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect image attribute verification (2D, 8012438)" }, { "cve": "CVE-2013-2464", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975757" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2463, CVE-2013-2465, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, and CVE-2013-2473.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2464" }, { "category": "external", "summary": "RHBZ#975757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2464", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2464" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2464", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2464" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (2D)" }, { "cve": "CVE-2013-2465", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975118" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image channel verification\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect image channel verification (2D, 8012597)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2465" }, { "category": "external", "summary": "RHBZ#975118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975118" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2465", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2465" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2465", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2465" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-28T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect image channel verification (2D, 8012597)" }, { "cve": "CVE-2013-2466", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975764" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2442 and CVE-2013-2468.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2466" }, { "category": "external", "summary": "RHBZ#975764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975764" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2466", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2466" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)" }, { "cve": "CVE-2013-2468", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975761" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2442 and CVE-2013-2466.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2468" }, { "category": "external", "summary": "RHBZ#975761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975761" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2468", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2468" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2468", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2468" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)" }, { "cve": "CVE-2013-2469", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975120" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image layout verification\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect image layout verification (2D, 8012601)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2469" }, { "category": "external", "summary": "RHBZ#975120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2469", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2469" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2469", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2469" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect image layout verification (2D, 8012601)" }, { "cve": "CVE-2013-2470", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975099" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"ImagingLib byte lookup processing.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: ImagingLib byte lookup processing (2D, 8011243)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2470" }, { "category": "external", "summary": "RHBZ#975099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2470", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2470" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2470", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2470" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: ImagingLib byte lookup processing (2D, 8011243)" }, { "cve": "CVE-2013-2471", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975102" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect IntegerComponentRaster size checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2471" }, { "category": "external", "summary": "RHBZ#975102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975102" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2471", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2471" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2471", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2471" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248)" }, { "cve": "CVE-2013-2472", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975107" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect ShortBandedRaster size checks\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2472" }, { "category": "external", "summary": "RHBZ#975107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975107" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2472", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2472" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2472", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2472" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253)" }, { "cve": "CVE-2013-2473", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975110" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect ByteBandedRaster size checks\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2473" }, { "category": "external", "summary": "RHBZ#975110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975110" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2473", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2473" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257)" }, { "cve": "CVE-2013-3743", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975767" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 45 and earlier and 5.0 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-3743" }, { "category": "external", "summary": "RHBZ#975767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975767" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-3743", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3743" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-3743", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3743" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite55:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite55:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT)" } ] }
rhsa-2013_0237
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.7.0-oracle packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Oracle Java SE version 7 includes the Oracle Java Runtime Environment and\nthe Oracle Java Software Development Kit.\n\nThis update fixes several vulnerabilities in the Oracle Java Runtime\nEnvironment and the Oracle Java Software Development Kit. Further\ninformation about these flaws can be found on the Oracle Java SE Critical\nPatch Update Advisory page, listed in the References section.\n(CVE-2012-1541, CVE-2012-3213, CVE-2012-3342, CVE-2013-0351, CVE-2013-0409,\nCVE-2013-0419, CVE-2013-0423, CVE-2013-0424, CVE-2013-0425, CVE-2013-0426,\nCVE-2013-0427, CVE-2013-0428, CVE-2013-0429, CVE-2013-0430, CVE-2013-0431,\nCVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0437,\nCVE-2013-0438, CVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443,\nCVE-2013-0444, CVE-2013-0445, CVE-2013-0446, CVE-2013-0448, CVE-2013-0449,\nCVE-2013-0450, CVE-2013-1473, CVE-2013-1475, CVE-2013-1476, CVE-2013-1478,\nCVE-2013-1479, CVE-2013-1480, CVE-2013-1489)\n\nAll users of java-1.7.0-oracle are advised to upgrade to these updated\npackages, which provide Oracle Java 7 Update 13 and resolve these issues.\nAll running instances of Oracle Java must be restarted for the update to\ntake effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0237", "url": "https://access.redhat.com/errata/RHSA-2013:0237" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" }, { "category": "external", "summary": "859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "860652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860652" }, { "category": "external", "summary": "906447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906447" }, { "category": "external", "summary": "906449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906449" }, { "category": "external", "summary": "906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "906914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914" }, { "category": "external", "summary": "906916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916" }, { "category": "external", "summary": "906917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917" }, { "category": "external", "summary": "906918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918" }, { "category": "external", "summary": "906921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921" }, { "category": "external", "summary": "906923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923" }, { "category": "external", "summary": "906930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906930" }, { "category": "external", "summary": "906932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906932" }, { "category": "external", "summary": "906933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933" }, { "category": "external", "summary": "906934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906934" }, { "category": "external", "summary": "906935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935" }, { "category": "external", "summary": "907190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907190" }, { "category": "external", "summary": "907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "907218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907218" }, { "category": "external", "summary": "907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "907222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907222" }, { "category": "external", "summary": "907223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223" }, { "category": "external", "summary": "907226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226" }, { "category": "external", "summary": "907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "907460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907460" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0237.json" } ], "title": "Red Hat Security Advisory: java-1.7.0-oracle security update", "tracking": { "current_release_date": "2024-12-08T10:36:37+00:00", "generator": { "date": "2024-12-08T10:36:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2013:0237", "initial_release_date": "2013-02-04T23:51:00+00:00", "revision_history": [ { "date": "2013-02-04T23:51:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-02-04T23:53:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-08T10:36:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "product": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "product_id": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-plugin@1.7.0.13-1jpp.1.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "product": { "name": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "product_id": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-devel@1.7.0.13-1jpp.1.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "product": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "product_id": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-jdbc@1.7.0.13-1jpp.1.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "product": { "name": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "product_id": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-src@1.7.0.13-1jpp.1.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "product": { "name": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "product_id": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-javafx@1.7.0.13-1jpp.1.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "product": { "name": "java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "product_id": "java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle@1.7.0.13-1jpp.1.el5_9?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "product": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "product_id": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-plugin@1.7.0.13-1jpp.1.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "product": { "name": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "product_id": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-devel@1.7.0.13-1jpp.1.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "product": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "product_id": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-jdbc@1.7.0.13-1jpp.1.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "product": { "name": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "product_id": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-src@1.7.0.13-1jpp.1.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "product": { "name": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "product_id": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-javafx@1.7.0.13-1jpp.1.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "product": { "name": "java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "product_id": "java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle@1.7.0.13-1jpp.1.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "product": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "product_id": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-plugin@1.7.0.13-1jpp.3.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "product": { "name": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "product_id": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-javafx@1.7.0.13-1jpp.3.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "product": { "name": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "product_id": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-src@1.7.0.13-1jpp.3.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "product": { "name": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "product_id": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle@1.7.0.13-1jpp.3.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "product": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "product_id": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-jdbc@1.7.0.13-1jpp.3.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "product": { "name": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "product_id": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-devel@1.7.0.13-1jpp.3.el6_3?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "product": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "product_id": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-plugin@1.7.0.13-1jpp.3.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "product": { "name": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "product_id": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-javafx@1.7.0.13-1jpp.3.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "product": { "name": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "product_id": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-src@1.7.0.13-1jpp.3.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "product": { "name": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "product_id": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle@1.7.0.13-1jpp.3.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "product": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "product_id": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-jdbc@1.7.0.13-1jpp.3.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "product": { "name": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "product_id": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-devel@1.7.0.13-1jpp.3.el6_3?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386" }, "product_reference": "java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64" }, "product_reference": "java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386" }, "product_reference": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64" }, "product_reference": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386" }, "product_reference": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64" }, "product_reference": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386" }, "product_reference": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64" }, "product_reference": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386" }, "product_reference": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64" }, "product_reference": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386" }, "product_reference": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64" }, "product_reference": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686" }, "product_reference": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" }, "product_reference": "java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-1541", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906914" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1541" }, { "category": "external", "summary": "RHBZ#906914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1541", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2012-3213", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907223" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3213" }, { "category": "external", "summary": "RHBZ#907223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3213", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)" }, { "cve": "CVE-2012-3342", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906917" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3342" }, { "category": "external", "summary": "RHBZ#906917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3342", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0351", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906923" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0351" }, { "category": "external", "summary": "RHBZ#906923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0351", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0409", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907226" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38 allows remote attackers to affect confidentiality via vectors related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0409" }, { "category": "external", "summary": "RHBZ#907226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0409", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0409" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)" }, { "cve": "CVE-2013-0419", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906918" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0419" }, { "category": "external", "summary": "RHBZ#906918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0419", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0423", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906921" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0423" }, { "category": "external", "summary": "RHBZ#906921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0423", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0424", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906813" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0424" }, { "category": "external", "summary": "RHBZ#906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0424", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0424" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)" }, { "cve": "CVE-2013-0425", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907344" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0425" }, { "category": "external", "summary": "RHBZ#907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0425", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0425" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)" }, { "cve": "CVE-2013-0426", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907346" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0426" }, { "category": "external", "summary": "RHBZ#907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0426", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0426" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)" }, { "cve": "CVE-2013-0427", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907455" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0427" }, { "category": "external", "summary": "RHBZ#907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)" }, { "cve": "CVE-2013-0428", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907207" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"incorrect checks for proxy classes\" in the Reflection API.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0428" }, { "category": "external", "summary": "RHBZ#907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0428", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)" }, { "cve": "CVE-2013-0429", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907460" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue involves the creation of a single PresentationManager that is shared across multiple thread groups, which allows remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0429" }, { "category": "external", "summary": "RHBZ#907460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907460" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0429", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0429" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0429", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0429" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694)" }, { "cve": "CVE-2013-0430", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906930" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to the installation process of the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Install)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0430" }, { "category": "external", "summary": "RHBZ#906930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906930" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0430", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0430" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0430", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0430" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Install)" }, { "cve": "CVE-2013-0431", "discovery_date": "2013-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906447" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows user-assisted remote attackers to bypass the Java security sandbox via unspecified vectors related to JMX, aka \"Issue 52,\" a different vulnerability than CVE-2013-1490.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JMX Introspector missing package access check (JMX, 8000539, SE-2012-01 Issue 52)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0431" }, { "category": "external", "summary": "RHBZ#906447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906447" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0431", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0431" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0431", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0431" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2013-01-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-05-25T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JMX Introspector missing package access check (JMX, 8000539, SE-2012-01 Issue 52)" }, { "cve": "CVE-2013-0432", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907219" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient clipboard access premission checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0432" }, { "category": "external", "summary": "RHBZ#907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0432", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)" }, { "cve": "CVE-2013-0433", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907456" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0433" }, { "category": "external", "summary": "RHBZ#907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0433", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0433" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)" }, { "cve": "CVE-2013-0434", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907453" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0434" }, { "category": "external", "summary": "RHBZ#907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0434", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0434" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)" }, { "cve": "CVE-2013-0435", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906892" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0435" }, { "category": "external", "summary": "RHBZ#906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0435", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)" }, { "cve": "CVE-2013-0437", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907222" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and JavaFX 2.2.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u13 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0437" }, { "category": "external", "summary": "RHBZ#907222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0437", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0437" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u13 (2D)" }, { "cve": "CVE-2013-0438", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906935" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0438" }, { "category": "external", "summary": "RHBZ#906935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0438", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0438" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0440", "discovery_date": "2012-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "859140" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0440" }, { "category": "external", "summary": "RHBZ#859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0440", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)" }, { "cve": "CVE-2013-0441", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907458" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka \"missing serialization restriction.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing serialization restriction (CORBA, 7201066)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0441" }, { "category": "external", "summary": "RHBZ#907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0441", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0441" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing serialization restriction (CORBA, 7201066)" }, { "cve": "CVE-2013-0442", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906899" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0442" }, { "category": "external", "summary": "RHBZ#906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0442", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)" }, { "cve": "CVE-2013-0443", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907340" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a \"small subgroup attack\" to force the use of weak session keys or obtain sensitive information about the private key.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0443" }, { "category": "external", "summary": "RHBZ#907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0443", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0443" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)" }, { "cve": "CVE-2013-0444", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907218" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient checks for cached results\" by the Java Beans MethodFinder, which might allow attackers to access methods that should only be accessible to privileged code.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MethodFinder insufficient checks for cached results (Beans, 7200493)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0444" }, { "category": "external", "summary": "RHBZ#907218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907218" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0444", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0444" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: MethodFinder insufficient checks for cached results (Beans, 7200493)" }, { "cve": "CVE-2013-0445", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906900" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0445" }, { "category": "external", "summary": "RHBZ#906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0445", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)" }, { "cve": "CVE-2013-0446", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906916" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0446" }, { "category": "external", "summary": "RHBZ#906916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0446", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0446" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0448", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906934" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 allows remote attackers to affect integrity via unknown vectors related to Libraries.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u13 (Libraries)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0448" }, { "category": "external", "summary": "RHBZ#906934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906934" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0448", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0448" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0448", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0448" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u13 (Libraries)" }, { "cve": "CVE-2013-0449", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906932" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0449" }, { "category": "external", "summary": "RHBZ#906932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906932" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0449", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0449" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0449", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0449" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u13 (Deployment)" }, { "cve": "CVE-2013-0450", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906911" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of \"access control context\" in the JMX RequiredModelMBean class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0450" }, { "category": "external", "summary": "RHBZ#906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0450", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)" }, { "cve": "CVE-2013-1473", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906933" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect integrity via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1473" }, { "category": "external", "summary": "RHBZ#906933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1473", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-1475", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "860652" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"IIOP type reuse management\" in ObjectStreamClass.java.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1475" }, { "category": "external", "summary": "RHBZ#860652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1475", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1475" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50)" }, { "cve": "CVE-2013-1476", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907457" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via \"certain value handler constructors.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1476" }, { "category": "external", "summary": "RHBZ#907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1476", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)" }, { "cve": "CVE-2013-1478", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906894" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" that can trigger an integer overflow and memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1478" }, { "category": "external", "summary": "RHBZ#906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1478", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)" }, { "cve": "CVE-2013-1479", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907190" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and JavaFX 2.2.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JavaFX)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1479" }, { "category": "external", "summary": "RHBZ#907190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1479", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1479" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1479", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1479" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JavaFX)" }, { "cve": "CVE-2013-1480", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906904" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" in awt_parseImage.c, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1480" }, { "category": "external", "summary": "RHBZ#906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1480", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1480" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)" }, { "cve": "CVE-2013-1489", "discovery_date": "2013-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906449" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 10 and Update 11, when running on Windows using Internet Explorer, Firefox, Opera, and Google Chrome, allows remote attackers to bypass the \"Very High\" security level of the Java Control Panel and execute unsigned Java code without prompting the user via unknown vectors, aka \"Issue 53\" and the \"Java Security Slider\" vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "7: bypass of the security level setting in browser plugin (Deployment, SE-2012-01 Issue 53)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1489" }, { "category": "external", "summary": "RHBZ#906449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906449" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1489", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1489" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1489", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1489" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-01-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0237" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.1.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.1.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-javafx-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.13-1jpp.3.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.13-1jpp.3.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "7: bypass of the security level setting in browser plugin (Deployment, SE-2012-01 Issue 53)" } ] }
rhsa-2013_0236
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-sun packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Oracle Java SE version 6 includes the Oracle Java Runtime Environment and\nthe Oracle Java Software Development Kit.\n\nThis update fixes several vulnerabilities in the Oracle Java Runtime\nEnvironment and the Oracle Java Software Development Kit. Further\ninformation about these flaws can be found on the Oracle Java SE Critical\nPatch Update Advisory page, listed in the References section.\n(CVE-2012-1541, CVE-2012-3213, CVE-2012-3342, CVE-2013-0351, CVE-2013-0409,\nCVE-2013-0419, CVE-2013-0423, CVE-2013-0424, CVE-2013-0425, CVE-2013-0426,\nCVE-2013-0427, CVE-2013-0428, CVE-2013-0429, CVE-2013-0430, CVE-2013-0432,\nCVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0438, CVE-2013-0440,\nCVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0445, CVE-2013-0446,\nCVE-2013-0450, CVE-2013-1473, CVE-2013-1475, CVE-2013-1476, CVE-2013-1478,\nCVE-2013-1480, CVE-2013-1481)\n\nAll users of java-1.6.0-sun are advised to upgrade to these updated\npackages, which provide Oracle Java 6 Update 39. All running instances of\nOracle Java must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0236", "url": "https://access.redhat.com/errata/RHSA-2013:0236" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" }, { "category": "external", "summary": "859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "860652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860652" }, { "category": "external", "summary": "906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "906914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914" }, { "category": "external", "summary": "906916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916" }, { "category": "external", "summary": "906917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917" }, { "category": "external", "summary": "906918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918" }, { "category": "external", "summary": "906921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921" }, { "category": "external", "summary": "906923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923" }, { "category": "external", "summary": "906930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906930" }, { "category": "external", "summary": "906933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933" }, { "category": "external", "summary": "906935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935" }, { "category": "external", "summary": "907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "907223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223" }, { "category": "external", "summary": "907224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224" }, { "category": "external", "summary": "907226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226" }, { "category": "external", "summary": "907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "907460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907460" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0236.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-sun security update", "tracking": { "current_release_date": "2024-12-08T10:36:32+00:00", "generator": { "date": "2024-12-08T10:36:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2013:0236", "initial_release_date": "2013-02-04T23:50:00+00:00", "revision_history": [ { "date": "2013-02-04T23:50:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-02-04T23:53:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-08T10:36:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.39-1jpp.4.el5_9?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.39-1jpp.4.el5_9?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "product": { "name": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "product_id": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.39-1jpp.4.el5_9?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "product_id": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.39-1jpp.4.el5_9?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "product_id": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.39-1jpp.4.el5_9?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "product_id": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.39-1jpp.4.el5_9?arch=i586\u0026epoch=1" } } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.39-1jpp.4.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.39-1jpp.4.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "product": { "name": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "product_id": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.39-1jpp.4.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "product_id": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.39-1jpp.4.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "product_id": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.39-1jpp.4.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "product_id": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.39-1jpp.4.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "product": { "name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "product_id": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.39-1jpp.1.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "product_id": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.39-1jpp.1.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.39-1jpp.1.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "product_id": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.39-1jpp.1.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.39-1jpp.1.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "product_id": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.39-1jpp.1.el6_3?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "product": { "name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "product_id": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.39-1jpp.1.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "product_id": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.39-1jpp.1.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "product_id": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.39-1jpp.1.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.39-1jpp.1.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "product_id": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.39-1jpp.1.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.39-1jpp.1.el6_3?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-1541", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906914" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1541" }, { "category": "external", "summary": "RHBZ#906914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1541", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2012-3213", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907223" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3213" }, { "category": "external", "summary": "RHBZ#907223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3213", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)" }, { "cve": "CVE-2012-3342", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906917" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3342" }, { "category": "external", "summary": "RHBZ#906917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3342", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0351", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906923" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0351" }, { "category": "external", "summary": "RHBZ#906923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0351", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0409", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907226" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38 allows remote attackers to affect confidentiality via vectors related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0409" }, { "category": "external", "summary": "RHBZ#907226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0409", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0409" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)" }, { "cve": "CVE-2013-0419", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906918" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0419" }, { "category": "external", "summary": "RHBZ#906918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0419", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0423", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906921" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0423" }, { "category": "external", "summary": "RHBZ#906921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0423", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0424", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906813" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0424" }, { "category": "external", "summary": "RHBZ#906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0424", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0424" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)" }, { "cve": "CVE-2013-0425", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907344" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0425" }, { "category": "external", "summary": "RHBZ#907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0425", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0425" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)" }, { "cve": "CVE-2013-0426", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907346" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0426" }, { "category": "external", "summary": "RHBZ#907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0426", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0426" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)" }, { "cve": "CVE-2013-0427", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907455" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0427" }, { "category": "external", "summary": "RHBZ#907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)" }, { "cve": "CVE-2013-0428", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907207" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"incorrect checks for proxy classes\" in the Reflection API.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0428" }, { "category": "external", "summary": "RHBZ#907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0428", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)" }, { "cve": "CVE-2013-0429", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907460" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue involves the creation of a single PresentationManager that is shared across multiple thread groups, which allows remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0429" }, { "category": "external", "summary": "RHBZ#907460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907460" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0429", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0429" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0429", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0429" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694)" }, { "cve": "CVE-2013-0430", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906930" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to the installation process of the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Install)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0430" }, { "category": "external", "summary": "RHBZ#906930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906930" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0430", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0430" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0430", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0430" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Install)" }, { "cve": "CVE-2013-0432", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907219" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient clipboard access premission checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0432" }, { "category": "external", "summary": "RHBZ#907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0432", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)" }, { "cve": "CVE-2013-0433", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907456" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0433" }, { "category": "external", "summary": "RHBZ#907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0433", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0433" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)" }, { "cve": "CVE-2013-0434", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907453" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0434" }, { "category": "external", "summary": "RHBZ#907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0434", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0434" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)" }, { "cve": "CVE-2013-0435", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906892" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0435" }, { "category": "external", "summary": "RHBZ#906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0435", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)" }, { "cve": "CVE-2013-0438", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906935" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0438" }, { "category": "external", "summary": "RHBZ#906935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0438", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0438" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0440", "discovery_date": "2012-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "859140" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0440" }, { "category": "external", "summary": "RHBZ#859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0440", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)" }, { "cve": "CVE-2013-0441", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907458" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka \"missing serialization restriction.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing serialization restriction (CORBA, 7201066)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0441" }, { "category": "external", "summary": "RHBZ#907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0441", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0441" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing serialization restriction (CORBA, 7201066)" }, { "cve": "CVE-2013-0442", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906899" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0442" }, { "category": "external", "summary": "RHBZ#906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0442", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)" }, { "cve": "CVE-2013-0443", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907340" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a \"small subgroup attack\" to force the use of weak session keys or obtain sensitive information about the private key.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0443" }, { "category": "external", "summary": "RHBZ#907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0443", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0443" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)" }, { "cve": "CVE-2013-0445", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906900" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0445" }, { "category": "external", "summary": "RHBZ#906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0445", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)" }, { "cve": "CVE-2013-0446", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906916" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0446" }, { "category": "external", "summary": "RHBZ#906916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0446", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0446" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0450", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906911" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of \"access control context\" in the JMX RequiredModelMBean class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0450" }, { "category": "external", "summary": "RHBZ#906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0450", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)" }, { "cve": "CVE-2013-1473", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906933" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect integrity via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1473" }, { "category": "external", "summary": "RHBZ#906933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1473", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-1475", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "860652" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"IIOP type reuse management\" in ObjectStreamClass.java.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1475" }, { "category": "external", "summary": "RHBZ#860652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1475", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1475" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50)" }, { "cve": "CVE-2013-1476", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907457" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via \"certain value handler constructors.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1476" }, { "category": "external", "summary": "RHBZ#907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1476", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)" }, { "cve": "CVE-2013-1478", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906894" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" that can trigger an integer overflow and memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1478" }, { "category": "external", "summary": "RHBZ#906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1478", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)" }, { "cve": "CVE-2013-1480", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906904" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" in awt_parseImage.c, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1480" }, { "category": "external", "summary": "RHBZ#906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1480", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1480" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)" }, { "cve": "CVE-2013-1481", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907224" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 (Sound)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1481" }, { "category": "external", "summary": "RHBZ#907224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1481", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1481" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-04T23:50:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.4.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.i586", "5Server-Supplementary-5.9.Z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.4.el5_9.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Client-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6ComputeNode-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Server-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-demo-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-devel-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-jdbc-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-plugin-1:1.6.0.39-1jpp.1.el6_3.x86_64", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.i686", "6Workstation-Supplementary-6.3.z:java-1.6.0-sun-src-1:1.6.0.39-1jpp.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 (Sound)" } ] }
rhsa-2013_0245
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-openjdk packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "These packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit.\n\nMultiple improper permission check issues were discovered in the AWT,\nCORBA, JMX, and Libraries components in OpenJDK. An untrusted Java\napplication or applet could use these flaws to bypass Java sandbox\nrestrictions. (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441, CVE-2013-1475,\nCVE-2013-1476, CVE-2013-0429, CVE-2013-0450, CVE-2013-0425, CVE-2013-0426,\nCVE-2013-0428)\n\nMultiple flaws were found in the way image parsers in the 2D and AWT\ncomponents handled image raster parameters. A specially-crafted image could\ncause Java Virtual Machine memory corruption and, possibly, lead to\narbitrary code execution with the virtual machine privileges.\n(CVE-2013-1478, CVE-2013-1480)\n\nA flaw was found in the AWT component\u0027s clipboard handling code. An\nuntrusted Java application or applet could use this flaw to access\nclipboard data, bypassing Java sandbox restrictions. (CVE-2013-0432)\n\nThe default Java security properties configuration did not restrict access\nto certain com.sun.xml.internal packages. An untrusted Java application or\napplet could use this flaw to access information, bypassing certain Java\nsandbox restrictions. This update lists the whole package as restricted.\n(CVE-2013-0435)\n\nMultiple improper permission check issues were discovered in the Libraries,\nNetworking, and JAXP components. An untrusted Java application or applet\ncould use these flaws to bypass certain Java sandbox restrictions.\n(CVE-2013-0427, CVE-2013-0433, CVE-2013-0434)\n\nIt was discovered that the RMI component\u0027s CGIHandler class used user\ninputs in error messages without any sanitization. An attacker could use\nthis flaw to perform a cross-site scripting (XSS) attack. (CVE-2013-0424)\n\nIt was discovered that the SSL/TLS implementation in the JSSE component\ndid not properly enforce handshake message ordering, allowing an unlimited\nnumber of handshake restarts. A remote attacker could use this flaw to\nmake an SSL/TLS server using JSSE consume an excessive amount of CPU by\ncontinuously restarting the handshake. (CVE-2013-0440)\n\nIt was discovered that the JSSE component did not properly validate\nDiffie-Hellman public keys. An SSL/TLS client could possibly use this flaw\nto perform a small subgroup attack. (CVE-2013-0443)\n\nNote: If the web browser plug-in provided by the icedtea-web package was\ninstalled, the issues exposed via Java applets could have been exploited\nwithout user interaction if a user visited a malicious website.\n\nThis erratum also upgrades the OpenJDK package to IcedTea6 1.11.6. Refer to\nthe NEWS file, linked to in the References, for further information.\n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0245", "url": "https://access.redhat.com/errata/RHSA-2013:0245" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS", "url": "http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS" }, { "category": "external", "summary": "859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "860652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860652" }, { "category": "external", "summary": "906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "907460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907460" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0245.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-openjdk security update", "tracking": { "current_release_date": "2024-12-08T10:36:42+00:00", "generator": { "date": "2024-12-08T10:36:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2013:0245", "initial_release_date": "2013-02-08T19:04:00+00:00", "revision_history": [ { "date": "2013-02-08T19:04:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-02-08T19:35:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-08T10:36:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.54.1.11.6.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.54.1.11.6.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.54.1.11.6.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.54.1.11.6.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.54.1.11.6.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.54.1.11.6.el6_3?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.54.1.11.6.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.54.1.11.6.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.54.1.11.6.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.54.1.11.6.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.54.1.11.6.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.54.1.11.6.el6_3?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.54.1.11.6.el6_3?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "relates_to_product_reference": "6Workstation-optional-6.3.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-0424", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906813" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0424" }, { "category": "external", "summary": "RHBZ#906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0424", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0424" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)" }, { "cve": "CVE-2013-0425", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907344" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0425" }, { "category": "external", "summary": "RHBZ#907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0425", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0425" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)" }, { "cve": "CVE-2013-0426", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907346" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0426" }, { "category": "external", "summary": "RHBZ#907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0426", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0426" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)" }, { "cve": "CVE-2013-0427", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907455" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0427" }, { "category": "external", "summary": "RHBZ#907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)" }, { "cve": "CVE-2013-0428", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907207" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"incorrect checks for proxy classes\" in the Reflection API.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0428" }, { "category": "external", "summary": "RHBZ#907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0428", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)" }, { "cve": "CVE-2013-0429", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907460" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue involves the creation of a single PresentationManager that is shared across multiple thread groups, which allows remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0429" }, { "category": "external", "summary": "RHBZ#907460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907460" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0429", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0429" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0429", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0429" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694)" }, { "cve": "CVE-2013-0432", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907219" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient clipboard access premission checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0432" }, { "category": "external", "summary": "RHBZ#907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0432", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)" }, { "cve": "CVE-2013-0433", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907456" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0433" }, { "category": "external", "summary": "RHBZ#907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0433", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0433" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)" }, { "cve": "CVE-2013-0434", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907453" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0434" }, { "category": "external", "summary": "RHBZ#907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0434", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0434" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)" }, { "cve": "CVE-2013-0435", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906892" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0435" }, { "category": "external", "summary": "RHBZ#906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0435", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)" }, { "cve": "CVE-2013-0440", "discovery_date": "2012-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "859140" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0440" }, { "category": "external", "summary": "RHBZ#859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0440", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)" }, { "cve": "CVE-2013-0441", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907458" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka \"missing serialization restriction.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing serialization restriction (CORBA, 7201066)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0441" }, { "category": "external", "summary": "RHBZ#907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0441", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0441" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing serialization restriction (CORBA, 7201066)" }, { "cve": "CVE-2013-0442", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906899" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0442" }, { "category": "external", "summary": "RHBZ#906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0442", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)" }, { "cve": "CVE-2013-0443", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907340" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a \"small subgroup attack\" to force the use of weak session keys or obtain sensitive information about the private key.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0443" }, { "category": "external", "summary": "RHBZ#907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0443", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0443" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)" }, { "cve": "CVE-2013-0445", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906900" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0445" }, { "category": "external", "summary": "RHBZ#906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0445", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)" }, { "cve": "CVE-2013-0450", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906911" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of \"access control context\" in the JMX RequiredModelMBean class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0450" }, { "category": "external", "summary": "RHBZ#906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0450", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)" }, { "cve": "CVE-2013-1475", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "860652" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"IIOP type reuse management\" in ObjectStreamClass.java.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1475" }, { "category": "external", "summary": "RHBZ#860652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1475", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1475" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50)" }, { "cve": "CVE-2013-1476", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907457" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via \"certain value handler constructors.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1476" }, { "category": "external", "summary": "RHBZ#907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1476", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)" }, { "cve": "CVE-2013-1478", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906894" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" that can trigger an integer overflow and memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1478" }, { "category": "external", "summary": "RHBZ#906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1478", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)" }, { "cve": "CVE-2013-1480", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906904" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" in awt_parseImage.c, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1480" }, { "category": "external", "summary": "RHBZ#906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1480", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1480" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-08T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Client-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Client-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Server-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Server-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.src", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.i686", "6Workstation-optional-6.3.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)" } ] }
rhsa-2013_1455
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Network Satellite Server 5.4.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "This update corrects several security vulnerabilities in the IBM Java\nRuntime Environment shipped as part of Red Hat Network Satellite Server\n5.4. In a typical operating environment, these are of low security risk as\nthe runtime is not used on untrusted applets.\n\nSeveral flaws were fixed in the IBM Java 2 Runtime Environment.\n(CVE-2011-0802, CVE-2011-0814, CVE-2011-0862, CVE-2011-0863, CVE-2011-0865,\nCVE-2011-0867, CVE-2011-0868, CVE-2011-0869, CVE-2011-0871, CVE-2011-0873,\nCVE-2011-3389, CVE-2011-3516, CVE-2011-3521, CVE-2011-3544, CVE-2011-3545,\nCVE-2011-3546, CVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3550,\nCVE-2011-3551, CVE-2011-3552, CVE-2011-3553, CVE-2011-3554, CVE-2011-3556,\nCVE-2011-3557, CVE-2011-3560, CVE-2011-3561, CVE-2011-3563, CVE-2011-5035,\nCVE-2012-0497, CVE-2012-0498, CVE-2012-0499, CVE-2012-0500, CVE-2012-0501,\nCVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507,\nCVE-2012-0547, CVE-2012-0551, CVE-2012-1531, CVE-2012-1532, CVE-2012-1533,\nCVE-2012-1541, CVE-2012-1682, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717,\nCVE-2012-1718, CVE-2012-1719, CVE-2012-1721, CVE-2012-1722, CVE-2012-1725,\nCVE-2012-3143, CVE-2012-3159, CVE-2012-3213, CVE-2012-3216, CVE-2012-3342,\nCVE-2012-4820, CVE-2012-4822, CVE-2012-4823, CVE-2012-5068, CVE-2012-5069,\nCVE-2012-5071, CVE-2012-5072, CVE-2012-5073, CVE-2012-5075, CVE-2012-5079,\nCVE-2012-5081, CVE-2012-5083, CVE-2012-5084, CVE-2012-5089, CVE-2013-0169,\nCVE-2013-0351, CVE-2013-0401, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423,\nCVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428,\nCVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0438,\nCVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0445,\nCVE-2013-0446, CVE-2013-0450, CVE-2013-0809, CVE-2013-1473, CVE-2013-1476,\nCVE-2013-1478, CVE-2013-1480, CVE-2013-1481, CVE-2013-1486, CVE-2013-1487,\nCVE-2013-1491, CVE-2013-1493, CVE-2013-1500, CVE-2013-1537, CVE-2013-1540,\nCVE-2013-1557, CVE-2013-1563, CVE-2013-1569, CVE-2013-1571, CVE-2013-2383,\nCVE-2013-2384, CVE-2013-2394, CVE-2013-2407, CVE-2013-2412, CVE-2013-2417,\nCVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2422, CVE-2013-2424,\nCVE-2013-2429, CVE-2013-2430, CVE-2013-2432, CVE-2013-2433, CVE-2013-2435,\nCVE-2013-2437, CVE-2013-2440, CVE-2013-2442, CVE-2013-2443, CVE-2013-2444,\nCVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2450, CVE-2013-2451,\nCVE-2013-2452, CVE-2013-2453, CVE-2013-2454, CVE-2013-2455, CVE-2013-2456,\nCVE-2013-2457, CVE-2013-2459, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465,\nCVE-2013-2466, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471,\nCVE-2013-2472, CVE-2013-2473, CVE-2013-3743)\n\nUsers of Red Hat Network Satellite Server 5.4 are advised to upgrade to\nthese updated packages, which contain the IBM Java SE 6 SR14 release. For\nthis update to take effect, Red Hat Network Satellite Server must be\nrestarted (\"/usr/sbin/rhn-satellite restart\"), as well as all running\ninstances of IBM Java.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1455", "url": "https://access.redhat.com/errata/RHSA-2013:1455" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "706106", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706106" }, { "category": "external", "summary": "706139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706139" }, { "category": "external", "summary": "706153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706153" }, { "category": "external", "summary": "706234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706234" }, { "category": "external", "summary": "706241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706241" }, { "category": "external", "summary": "706248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706248" }, { "category": "external", "summary": "711675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711675" }, { "category": "external", "summary": "711676", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711676" }, { "category": "external", "summary": "711677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711677" }, { "category": "external", "summary": "737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "745387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387" }, { "category": "external", "summary": "745391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391" }, { "category": "external", "summary": "745397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397" }, { "category": "external", "summary": "745399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399" }, { "category": "external", "summary": "745442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442" }, { "category": "external", "summary": "745447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447" }, { "category": "external", "summary": "745459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459" }, { "category": "external", "summary": "745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "745473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473" }, { "category": "external", "summary": "745476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476" }, { "category": "external", "summary": "747191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191" }, { "category": "external", "summary": "747198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198" }, { "category": "external", "summary": "747200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200" }, { "category": "external", "summary": "747203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203" }, { "category": "external", "summary": "747205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205" }, { "category": "external", "summary": "747208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208" }, { "category": "external", "summary": "788606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788606" }, { "category": "external", "summary": "788624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624" }, { "category": "external", "summary": "788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "789301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301" }, { "category": "external", "summary": "790720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720" }, { "category": "external", "summary": "790722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722" }, { "category": "external", "summary": "790724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790724" }, { "category": "external", "summary": "829358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358" }, { "category": "external", "summary": "829360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360" }, { "category": "external", "summary": "829361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361" }, { "category": "external", "summary": "829371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371" }, { "category": "external", "summary": "829372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372" }, { "category": "external", "summary": "829376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376" }, { "category": "external", "summary": "831353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353" }, { "category": "external", "summary": "831354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354" }, { "category": "external", "summary": "831355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355" }, { "category": "external", "summary": "853097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853097" }, { "category": "external", "summary": "853228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853228" }, { "category": "external", "summary": "859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "865346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865346" }, { "category": "external", "summary": "865348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865348" }, { "category": "external", "summary": "865357", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865357" }, { "category": "external", "summary": "865363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865363" }, { "category": "external", "summary": "865365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865365" }, { "category": "external", "summary": "865370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865370" }, { "category": "external", "summary": "865511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865511" }, { "category": "external", "summary": "865514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865514" }, { "category": "external", "summary": "865519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865519" }, { "category": "external", "summary": "865531", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865531" }, { "category": "external", "summary": "865568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865568" }, { "category": "external", "summary": "867185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867185" }, { "category": "external", "summary": "867186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867186" }, { "category": "external", "summary": "867187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867187" }, { "category": "external", "summary": "867189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867189" }, { "category": "external", "summary": "867190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867190" }, { "category": "external", "summary": "867193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867193" }, { "category": "external", "summary": "876386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876386" }, { "category": "external", "summary": "876388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876388" }, { "category": "external", "summary": "876389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876389" }, { "category": "external", "summary": "906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "906914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914" }, { "category": "external", "summary": "906916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916" }, { "category": "external", "summary": "906917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917" }, { "category": "external", "summary": "906918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918" }, { "category": "external", "summary": "906921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921" }, { "category": "external", "summary": "906923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923" }, { "category": "external", "summary": "906933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933" }, { "category": "external", "summary": "906935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935" }, { "category": "external", "summary": "907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "907223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223" }, { "category": "external", "summary": "907224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224" }, { "category": "external", "summary": "907226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226" }, { "category": "external", "summary": "907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "907589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589" }, { "category": "external", "summary": "913014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913014" }, { "category": "external", "summary": "913030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913030" }, { "category": "external", "summary": "917550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917550" }, { "category": "external", "summary": "917553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917553" }, { "category": "external", "summary": "920245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=920245" }, { "category": "external", "summary": "920248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=920248" }, { "category": "external", "summary": "952387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952387" }, { "category": "external", "summary": "952509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952509" }, { "category": "external", "summary": "952521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952521" }, { "category": "external", "summary": "952524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952524" }, { "category": "external", "summary": "952638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952638" }, { "category": "external", "summary": "952642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952642" }, { "category": "external", "summary": "952648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952648" }, { "category": "external", "summary": "952656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952656" }, { "category": "external", "summary": "952657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952657" }, { "category": "external", "summary": "952708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952708" }, { "category": "external", "summary": "952709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952709" }, { "category": "external", "summary": "952711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952711" }, { "category": "external", "summary": "953166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953166" }, { "category": "external", "summary": "953172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953172" }, { "category": "external", "summary": "953265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953265" }, { "category": "external", "summary": "953267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953267" }, { "category": "external", "summary": "953269", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953269" }, { "category": "external", "summary": "953270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953270" }, { "category": "external", "summary": "953273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953273" }, { "category": "external", "summary": "953275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953275" }, { "category": "external", "summary": "973474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=973474" }, { "category": "external", "summary": "975099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975099" }, { "category": "external", "summary": "975102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975102" }, { "category": "external", "summary": "975107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975107" }, { "category": "external", "summary": "975110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975110" }, { "category": "external", "summary": "975115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975115" }, { "category": "external", "summary": "975118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975118" }, { "category": "external", "summary": "975120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975120" }, { "category": "external", "summary": "975121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975121" }, { "category": "external", "summary": "975125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975125" }, { "category": "external", "summary": "975127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975127" }, { "category": "external", "summary": "975129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975129" }, { "category": "external", "summary": "975131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975131" }, { "category": "external", "summary": "975132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975132" }, { "category": "external", "summary": "975133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975133" }, { "category": "external", "summary": "975134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975134" }, { "category": "external", "summary": "975137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975137" }, { "category": "external", "summary": "975138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975138" }, { "category": "external", "summary": "975139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975139" }, { "category": "external", "summary": "975140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975140" }, { "category": "external", "summary": "975141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975141" }, { "category": "external", "summary": "975142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975142" }, { "category": "external", "summary": "975144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975144" }, { "category": "external", "summary": "975146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975146" }, { "category": "external", "summary": "975148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975148" }, { "category": "external", "summary": "975757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975757" }, { "category": "external", "summary": "975761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975761" }, { "category": "external", "summary": "975764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975764" }, { "category": "external", "summary": "975767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975767" }, { "category": "external", "summary": "975770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975770" }, { "category": "external", "summary": "975773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975773" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1455.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update", "tracking": { "current_release_date": "2024-12-08T10:38:36+00:00", "generator": { "date": "2024-12-08T10:38:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2013:1455", "initial_release_date": "2013-10-23T16:26:00+00:00", "revision_history": [ { "date": "2013-10-23T16:26:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-10-23T16:30:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-08T10:38:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.4 (RHEL v.5)", "product": { "name": "Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.4::el5" } } }, { "category": "product_name", "name": "Red Hat Satellite 5.4 (RHEL v.6)", "product": { "name": "Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.4::el6" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el6_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el6_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "relates_to_product_reference": "6Server-Satellite" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-0802", "discovery_date": "2011-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "711677" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0814.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0802" }, { "category": "external", "summary": "RHBZ#711677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711677" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0802", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0802" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)" }, { "cve": "CVE-2011-0814", "discovery_date": "2011-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "711677" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0802.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0814" }, { "category": "external", "summary": "RHBZ#711677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711677" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0814", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0814" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0814", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0814" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)" }, { "cve": "CVE-2011-0862", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2011-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "706139" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allow remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0862" }, { "category": "external", "summary": "RHBZ#706139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706139" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0862", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0862" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0862", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0862" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519)" }, { "cve": "CVE-2011-0863", "discovery_date": "2011-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "711676" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u26 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0863" }, { "category": "external", "summary": "RHBZ#711676", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711676" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0863", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0863" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0863", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0863" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u26 (Deployment)" }, { "cve": "CVE-2011-0865", "discovery_date": "2011-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "706106" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to Deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0865" }, { "category": "external", "summary": "RHBZ#706106", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706106" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0865", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0865" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0865", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0865" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658)" }, { "cve": "CVE-2011-0867", "discovery_date": "2011-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "706153" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: NetworkInterface information leak (Networking, 7013969)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0867" }, { "category": "external", "summary": "RHBZ#706153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0867", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0867" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0867", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0867" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: NetworkInterface information leak (Networking, 7013969)" }, { "cve": "CVE-2011-0868", "discovery_date": "2011-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "706241" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote attackers to affect confidentiality via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0868" }, { "category": "external", "summary": "RHBZ#706241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706241" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0868", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0868" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0868", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0868" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495)" }, { "cve": "CVE-2011-0869", "discovery_date": "2011-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "706234" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 26 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to SAAJ.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0869" }, { "category": "external", "summary": "RHBZ#706234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706234" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0869", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0869" } ], "release_date": "2011-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971)" }, { "cve": "CVE-2011-0871", "discovery_date": "2011-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "706248" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0871" }, { "category": "external", "summary": "RHBZ#706248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706248" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0871", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0871" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198)" }, { "cve": "CVE-2011-0873", "discovery_date": "2011-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "711675" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, and 5.0 Update 29 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u26 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0873" }, { "category": "external", "summary": "RHBZ#711675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711675" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0873", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0873" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0873", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0873" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u26 (2D)" }, { "cve": "CVE-2011-3389", "discovery_date": "2011-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "737506" } ], "notes": [ { "category": "description", "text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3389" }, { "category": "external", "summary": "RHBZ#737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389" } ], "release_date": "2011-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)" }, { "cve": "CVE-2011-3516", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747203" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3516" }, { "category": "external", "summary": "RHBZ#747203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3516", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)" }, { "cve": "CVE-2011-3521", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745442" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3521" }, { "category": "external", "summary": "RHBZ#745442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3521", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3521" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)" }, { "cve": "CVE-2011-3544", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745399" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3544" }, { "category": "external", "summary": "RHBZ#745399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3544", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3544" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)" }, { "cve": "CVE-2011-3545", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747191" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3545" }, { "category": "external", "summary": "RHBZ#747191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3545" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)" }, { "cve": "CVE-2011-3546", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747205" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3546" }, { "category": "external", "summary": "RHBZ#747205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3546", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)" }, { "cve": "CVE-2011-3547", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745387" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3547" }, { "category": "external", "summary": "RHBZ#745387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)" }, { "cve": "CVE-2011-3548", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745473" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3548" }, { "category": "external", "summary": "RHBZ#745473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)" }, { "cve": "CVE-2011-3549", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747198" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3549" }, { "category": "external", "summary": "RHBZ#747198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)" }, { "cve": "CVE-2011-3550", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747200" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (AWT)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3550" }, { "category": "external", "summary": "RHBZ#747200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3550", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (AWT)" }, { "cve": "CVE-2011-3551", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745391" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3551" }, { "category": "external", "summary": "RHBZ#745391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3551", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)" }, { "cve": "CVE-2011-3552", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745397" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3552" }, { "category": "external", "summary": "RHBZ#745397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3552" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)" }, { "cve": "CVE-2011-3553", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745476" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3553" }, { "category": "external", "summary": "RHBZ#745476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3553", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3553" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)" }, { "cve": "CVE-2011-3554", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745447" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3554" }, { "category": "external", "summary": "RHBZ#745447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3554", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3554" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)" }, { "cve": "CVE-2011-3556", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745459" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3556" }, { "category": "external", "summary": "RHBZ#745459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)" }, { "cve": "CVE-2011-3557", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745464" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3557" }, { "category": "external", "summary": "RHBZ#745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)" }, { "cve": "CVE-2011-3560", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745379" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3560" }, { "category": "external", "summary": "RHBZ#745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3560" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)" }, { "cve": "CVE-2011-3561", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747208" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3561" }, { "category": "external", "summary": "RHBZ#747208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3561", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3561" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)" }, { "cve": "CVE-2011-3563", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789295" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3563" }, { "category": "external", "summary": "RHBZ#789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3563", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)" }, { "cve": "CVE-2011-5035", "discovery_date": "2011-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771283" } ], "notes": [ { "category": "description", "text": "Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.", "title": "Vulnerability description" }, { "category": "summary", "text": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)", "title": "Vulnerability summary" }, { "category": "other", "text": "Not vulnerable. This issue affects the GlassFish Web Container component. This\ncomponent is not shipped with any Red Hat products. JBoss Web and Tomcat\nprovide the web container used in all JBoss products.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-5035" }, { "category": "external", "summary": "RHBZ#771283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771283" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-5035", "url": "https://www.cve.org/CVERecord?id=CVE-2011-5035" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035" } ], "release_date": "2011-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)" }, { "cve": "CVE-2012-0497", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789301" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, and 6 Update 30 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0497" }, { "category": "external", "summary": "RHBZ#789301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0497", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0497" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0497", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0497" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)" }, { "cve": "CVE-2012-0498", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790720" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0498" }, { "category": "external", "summary": "RHBZ#790720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0498", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0498" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)" }, { "cve": "CVE-2012-0499", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790722" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0499" }, { "category": "external", "summary": "RHBZ#790722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0499", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0499" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)" }, { "cve": "CVE-2012-0500", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790724" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and JavaFX 2.0.2 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0500" }, { "category": "external", "summary": "RHBZ#790724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0500", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0500" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0500", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0500" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment)" }, { "cve": "CVE-2012-0501", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788624" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0501" }, { "category": "external", "summary": "RHBZ#788624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0501", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)" }, { "cve": "CVE-2012-0502", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789297" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0502" }, { "category": "external", "summary": "RHBZ#789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0502", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)" }, { "cve": "CVE-2012-0503", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788976" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0503" }, { "category": "external", "summary": "RHBZ#788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)" }, { "cve": "CVE-2012-0505", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789299" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0505" }, { "category": "external", "summary": "RHBZ#789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)" }, { "cve": "CVE-2012-0506", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789300" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers (CORBA, 7110704)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0506" }, { "category": "external", "summary": "RHBZ#789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0506", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0506" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers (CORBA, 7110704)" }, { "cve": "CVE-2012-0507", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788994" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0507" }, { "category": "external", "summary": "RHBZ#788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0507", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0507" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)" }, { "cve": "CVE-2012-0547", "discovery_date": "2012-08-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "853228" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier, and 6 Update 34 and earlier, has no impact and remote attack vectors involving AWT and \"a security-in-depth issue that is not directly exploitable but which can be used to aggravate security vulnerabilities that can be directly exploited.\" NOTE: this identifier was assigned by the Oracle CNA, but CVE is not intended to cover defense-in-depth issues that are only exposed by the presence of other vulnerabilities. NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to \"toolkit internals references.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AWT hardening fixes (AWT, 7163201)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0547" }, { "category": "external", "summary": "RHBZ#853228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853228" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0547", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0547" } ], "release_date": "2012-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: AWT hardening fixes (AWT, 7163201)" }, { "cve": "CVE-2012-0551", "discovery_date": "2012-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "831355" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE 7 update 4 and earlier and 6 update 32 and earlier, and the GlassFish Enterprise Server component in Oracle Sun Products Suite GlassFish Enterprise Server 3.1.1, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Web Container or Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0551" }, { "category": "external", "summary": "RHBZ#831355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0551", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0551" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)" }, { "cve": "CVE-2012-1531", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867185" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier; and JavaFX 2.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1531" }, { "category": "external", "summary": "RHBZ#867185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867185" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1531", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1531" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1531", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1531" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (2D)" }, { "cve": "CVE-2012-1532", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867186" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier and 6 Update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1532" }, { "category": "external", "summary": "RHBZ#867186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867186" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1532", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1532" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1532", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1532" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (Deployment)" }, { "cve": "CVE-2012-1533", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867187" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-3159.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1533" }, { "category": "external", "summary": "RHBZ#867187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867187" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1533", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1533" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1533", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1533" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (Deployment)" }, { "cve": "CVE-2012-1541", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906914" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1541" }, { "category": "external", "summary": "RHBZ#906914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1541", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2012-1682", "discovery_date": "2012-08-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "853097" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-3136. NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to \"XMLDecoder security issue via ClassFinder.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1682" }, { "category": "external", "summary": "RHBZ#853097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853097" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1682", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1682" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1682", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1682" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html" } ], "release_date": "2012-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476)" }, { "cve": "CVE-2012-1713", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829361" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, 1.4.2_37 and earlier, and JavaFX 2.1 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1713" }, { "category": "external", "summary": "RHBZ#829361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1713", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1713" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)" }, { "cve": "CVE-2012-1716", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829360" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1716" }, { "category": "external", "summary": "RHBZ#829360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1716", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)" }, { "cve": "CVE-2012-1717", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829358" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insecure temporary file permissions (JRE, 7143606)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1717" }, { "category": "external", "summary": "RHBZ#829358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1717", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: insecure temporary file permissions (JRE, 7143606)" }, { "cve": "CVE-2012-1718", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829372" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect availability via unknown vectors related to Security.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1718" }, { "category": "external", "summary": "RHBZ#829372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1718", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)" }, { "cve": "CVE-2012-1719", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829371" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect integrity, related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1719" }, { "category": "external", "summary": "RHBZ#829371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1719", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)" }, { "cve": "CVE-2012-1721", "discovery_date": "2012-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "831353" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1722.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1721" }, { "category": "external", "summary": "RHBZ#831353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1721", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1721" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)" }, { "cve": "CVE-2012-1722", "discovery_date": "2012-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "831354" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1721.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1722" }, { "category": "external", "summary": "RHBZ#831354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1722", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1722" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1722", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1722" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)" }, { "cve": "CVE-2012-1725", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829376" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1725" }, { "category": "external", "summary": "RHBZ#829376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1725", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1725" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)" }, { "cve": "CVE-2012-3143", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867189" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-5089.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (JMX)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3143" }, { "category": "external", "summary": "RHBZ#867189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867189" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3143", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3143" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (JMX)" }, { "cve": "CVE-2012-3159", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867190" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1533.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3159" }, { "category": "external", "summary": "RHBZ#867190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3159", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3159" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3159", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3159" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability (Deployment)" }, { "cve": "CVE-2012-3213", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907223" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3213" }, { "category": "external", "summary": "RHBZ#907223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3213", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)" }, { "cve": "CVE-2012-3216", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865346" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: java.io.FilePermission information leak (Libraries, 6631398)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3216" }, { "category": "external", "summary": "RHBZ#865346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865346" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3216", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3216" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3216", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3216" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: java.io.FilePermission information leak (Libraries, 6631398)" }, { "cve": "CVE-2012-3342", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906917" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3342" }, { "category": "external", "summary": "RHBZ#906917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3342", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2012-4820", "discovery_date": "2012-11-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "876386" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, when running under a security manager, allows remote attackers to gain privileges by modifying or removing the security manager via vectors related to \"insecure use of the java.lang.reflect.Method invoke() method.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: java.lang.reflect.Method invoke() code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4820" }, { "category": "external", "summary": "RHBZ#876386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4820", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4820" }, { "category": "external", "summary": "http://xforce.iss.net/xforce/xfdb/78764", "url": "http://xforce.iss.net/xforce/xfdb/78764" } ], "release_date": "2012-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: java.lang.reflect.Method invoke() code execution" }, { "cve": "CVE-2012-4822", "discovery_date": "2012-11-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "876388" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, allow remote attackers to execute arbitrary code via vectors related to \"insecure use [of] multiple methods in the java.lang.class class.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: java.lang.class code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4822" }, { "category": "external", "summary": "RHBZ#876388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4822", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4822" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4822", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4822" }, { "category": "external", "summary": "http://xforce.iss.net/xforce/xfdb/78766", "url": "http://xforce.iss.net/xforce/xfdb/78766" } ], "release_date": "2012-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: java.lang.class code execution" }, { "cve": "CVE-2012-4823", "discovery_date": "2012-11-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "876389" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, allows remote attackers to execute arbitrary code via vectors related to \"insecure use of the java.lang.ClassLoder defineClass() method.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: java.lang.ClassLoder defineClass() code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4823" }, { "category": "external", "summary": "RHBZ#876389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4823", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4823" }, { "category": "external", "summary": "http://xforce.iss.net/xforce/xfdb/78767", "url": "http://xforce.iss.net/xforce/xfdb/78767" } ], "release_date": "2012-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: java.lang.ClassLoder defineClass() code execution" }, { "cve": "CVE-2012-5068", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865348" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5068" }, { "category": "external", "summary": "RHBZ#865348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865348" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5068", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5068" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535)" }, { "cve": "CVE-2012-5069", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865531" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Concurrency.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Executors state handling issues (Concurrency, 7189103)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5069" }, { "category": "external", "summary": "RHBZ#865531", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865531" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5069", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5069" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5069", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5069" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: Executors state handling issues (Concurrency, 7189103)" }, { "cve": "CVE-2012-5071", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865519" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity, related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5071" }, { "category": "external", "summary": "RHBZ#865519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865519" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5071", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5071" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5071", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5071" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975)" }, { "cve": "CVE-2012-5072", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865365" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality via unknown vectors related to Security.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5072" }, { "category": "external", "summary": "RHBZ#865365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865365" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5072", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5072" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522)" }, { "cve": "CVE-2012-5073", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865357" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5079.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: LogManager security bypass (Libraries, 7169884)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5073" }, { "category": "external", "summary": "RHBZ#865357", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865357" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5073", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5073" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: LogManager security bypass (Libraries, 7169884)" }, { "cve": "CVE-2012-5075", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865363" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5075" }, { "category": "external", "summary": "RHBZ#865363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865363" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5075", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5075" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5075", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5075" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888)" }, { "cve": "CVE-2012-5079", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865568" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5073.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5079" }, { "category": "external", "summary": "RHBZ#865568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865568" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5079", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5079" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919)" }, { "cve": "CVE-2012-5081", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865370" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect availability, related to JSSE.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JSSE denial of service (JSSE, 7186286)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5081" }, { "category": "external", "summary": "RHBZ#865370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865370" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5081", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5081" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JSSE denial of service (JSSE, 7186286)" }, { "cve": "CVE-2012-5083", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867193" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, 1.4.2_38 and earlier, and JavaFX 2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5083" }, { "category": "external", "summary": "RHBZ#867193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867193" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5083", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5083" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5083", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5083" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (2D)" }, { "cve": "CVE-2012-5084", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865511" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5084" }, { "category": "external", "summary": "RHBZ#865511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865511" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5084", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5084" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5084", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5084" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194)" }, { "cve": "CVE-2012-5089", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865514" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-3143.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5089" }, { "category": "external", "summary": "RHBZ#865514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865514" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5089", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5089" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5089", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5089" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)" }, { "cve": "CVE-2013-0169", "discovery_date": "2013-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907589" } ], "notes": [ { "category": "description", "text": "The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the \"Lucky Thirteen\" issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "SSL/TLS: CBC padding timing attack (lucky-13)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0169" }, { "category": "external", "summary": "RHBZ#907589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0169", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169" }, { "category": "external", "summary": "http://www.isg.rhul.ac.uk/tls/", "url": "http://www.isg.rhul.ac.uk/tls/" }, { "category": "external", "summary": "http://www.openssl.org/news/secadv_20130205.txt", "url": "http://www.openssl.org/news/secadv_20130205.txt" }, { "category": "external", "summary": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released", "url": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released" } ], "release_date": "2013-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" }, { "category": "workaround", "details": "On OpenShift Container Platform 3.11 it\u0027s possible to edit the list of cipher suites offered by the router when performing \u0027edge\u0027, or \u0027re-encrypt\u0027 TLS modes. Please follow the documentation [1], and [2] to remove the vulnerable CBC ciphers use the modern, or intermediate cipher suites outlined by Mozilla instead [3]. In \u0027passthrough\u0027 mode TLS termination occurs in the application so that is another way to mitigate the vulnerability.\n[1] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#obtaining-router-configuration-template\n[2] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#using-configmap-replace-template\n[3] https://wiki.mozilla.org/Security/Server_Side_TLS", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "SSL/TLS: CBC padding timing attack (lucky-13)" }, { "cve": "CVE-2013-0351", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906923" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0351" }, { "category": "external", "summary": "RHBZ#906923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0351", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0401", "discovery_date": "2013-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "920245" } ], "notes": [ { "category": "description", "text": "The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to execute arbitrary code via vectors related to AWT, as demonstrated by Ben Murphy during a Pwn2Own competition at CanSecWest 2013. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to invocation of the system class loader by the sun.awt.datatransfer.ClassLoaderObjectInputStream class, which allows remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0401" }, { "category": "external", "summary": "RHBZ#920245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=920245" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0401", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0401" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0401", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0401" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305)" }, { "cve": "CVE-2013-0409", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907226" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38 allows remote attackers to affect confidentiality via vectors related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0409" }, { "category": "external", "summary": "RHBZ#907226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0409", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0409" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)" }, { "cve": "CVE-2013-0419", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906918" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0419" }, { "category": "external", "summary": "RHBZ#906918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0419", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0423", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906921" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0423" }, { "category": "external", "summary": "RHBZ#906921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0423", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0424", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906813" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0424" }, { "category": "external", "summary": "RHBZ#906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0424", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0424" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)" }, { "cve": "CVE-2013-0425", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907344" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0425" }, { "category": "external", "summary": "RHBZ#907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0425", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0425" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)" }, { "cve": "CVE-2013-0426", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907346" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0426" }, { "category": "external", "summary": "RHBZ#907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0426", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0426" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)" }, { "cve": "CVE-2013-0427", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907455" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0427" }, { "category": "external", "summary": "RHBZ#907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)" }, { "cve": "CVE-2013-0428", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907207" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"incorrect checks for proxy classes\" in the Reflection API.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0428" }, { "category": "external", "summary": "RHBZ#907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0428", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)" }, { "cve": "CVE-2013-0432", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907219" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient clipboard access premission checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0432" }, { "category": "external", "summary": "RHBZ#907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0432", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)" }, { "cve": "CVE-2013-0433", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907456" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0433" }, { "category": "external", "summary": "RHBZ#907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0433", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0433" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)" }, { "cve": "CVE-2013-0434", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907453" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0434" }, { "category": "external", "summary": "RHBZ#907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0434", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0434" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)" }, { "cve": "CVE-2013-0435", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906892" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0435" }, { "category": "external", "summary": "RHBZ#906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0435", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)" }, { "cve": "CVE-2013-0438", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906935" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0438" }, { "category": "external", "summary": "RHBZ#906935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0438", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0438" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0440", "discovery_date": "2012-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "859140" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0440" }, { "category": "external", "summary": "RHBZ#859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0440", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)" }, { "cve": "CVE-2013-0441", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907458" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka \"missing serialization restriction.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing serialization restriction (CORBA, 7201066)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0441" }, { "category": "external", "summary": "RHBZ#907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0441", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0441" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing serialization restriction (CORBA, 7201066)" }, { "cve": "CVE-2013-0442", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906899" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0442" }, { "category": "external", "summary": "RHBZ#906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0442", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)" }, { "cve": "CVE-2013-0443", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907340" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a \"small subgroup attack\" to force the use of weak session keys or obtain sensitive information about the private key.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0443" }, { "category": "external", "summary": "RHBZ#907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0443", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0443" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)" }, { "cve": "CVE-2013-0445", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906900" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0445" }, { "category": "external", "summary": "RHBZ#906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0445", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)" }, { "cve": "CVE-2013-0446", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906916" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0446" }, { "category": "external", "summary": "RHBZ#906916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0446", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0446" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0450", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906911" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of \"access control context\" in the JMX RequiredModelMBean class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0450" }, { "category": "external", "summary": "RHBZ#906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0450", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)" }, { "cve": "CVE-2013-0809", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2013-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "917550" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Specially crafted sample model integer overflow (2D, 8007014)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0809" }, { "category": "external", "summary": "RHBZ#917550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917550" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0809", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0809" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html" } ], "release_date": "2013-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Specially crafted sample model integer overflow (2D, 8007014)" }, { "cve": "CVE-2013-1473", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906933" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect integrity via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1473" }, { "category": "external", "summary": "RHBZ#906933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1473", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-1476", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907457" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via \"certain value handler constructors.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1476" }, { "category": "external", "summary": "RHBZ#907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1476", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)" }, { "cve": "CVE-2013-1478", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906894" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" that can trigger an integer overflow and memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1478" }, { "category": "external", "summary": "RHBZ#906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1478", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)" }, { "cve": "CVE-2013-1480", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906904" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" in awt_parseImage.c, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1480" }, { "category": "external", "summary": "RHBZ#906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1480", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1480" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)" }, { "cve": "CVE-2013-1481", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907224" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 (Sound)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1481" }, { "category": "external", "summary": "RHBZ#907224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1481", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1481" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 (Sound)" }, { "cve": "CVE-2013-1486", "discovery_date": "2013-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "913014" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier, 6 Update 39 and earlier, and 5.0 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1486" }, { "category": "external", "summary": "RHBZ#913014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1486", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1486" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1486", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1486" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html" } ], "release_date": "2013-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446)" }, { "cve": "CVE-2013-1487", "discovery_date": "2013-02-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "913030" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE 7 Update 13 and earlier and 6 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1487" }, { "category": "external", "summary": "RHBZ#913030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913030" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1487", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1487" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1487", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1487" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html" } ], "release_date": "2013-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment)" }, { "cve": "CVE-2013-1491", "discovery_date": "2013-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "920248" } ], "notes": [ { "category": "description", "text": "The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to execute arbitrary code via vectors related to 2D, as demonstrated by Joshua Drake during a Pwn2Own competition at CanSecWest 2013.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified sanbox bypass (CanSecWest 2013, 2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1491" }, { "category": "external", "summary": "RHBZ#920248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=920248" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1491", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1491" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1491", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1491" } ], "release_date": "2013-03-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified sanbox bypass (CanSecWest 2013, 2D)" }, { "cve": "CVE-2013-1493", "discovery_date": "2013-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "917553" } ], "notes": [ { "category": "description", "text": "The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CMM malformed raster memory corruption (2D, 8007675)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1493" }, { "category": "external", "summary": "RHBZ#917553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917553" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1493", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1493" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1493", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1493" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html" } ], "release_date": "2013-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: CMM malformed raster memory corruption (2D, 8007675)" }, { "acknowledgments": [ { "names": [ "Tim Brown" ] } ], "cve": "CVE-2013-1500", "discovery_date": "2013-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975148" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality and integrity via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to weak permissions for shared memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Insecure shared memory permissions (2D, 8001034)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1500" }, { "category": "external", "summary": "RHBZ#975148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975148" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1500", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1500" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1500", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1500" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: Insecure shared memory permissions (2D, 8001034)" }, { "cve": "CVE-2013-1537", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952387" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the default java.rmi.server.useCodebaseOnly setting of false, which allows remote attackers to perform \"dynamic class downloading\" and execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: remote code loading enabled by default (RMI, 8001040)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1537" }, { "category": "external", "summary": "RHBZ#952387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952387" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1537", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1537" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: remote code loading enabled by default (RMI, 8001040)" }, { "cve": "CVE-2013-1540", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953166" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2433.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1540" }, { "category": "external", "summary": "RHBZ#953166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1540", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1540" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-1557", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952648" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"missing security restrictions\" in the LogStream.setDefaultStream method.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1557" }, { "category": "external", "summary": "RHBZ#952648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952648" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1557", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1557" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329)" }, { "cve": "CVE-2013-1563", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953172" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1563" }, { "category": "external", "summary": "RHBZ#953172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953172" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1563", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1563" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install)" }, { "cve": "CVE-2013-1569", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952711" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"checking of [a] glyph table\" in the International Components for Unicode (ICU) Layout Engine before 51.2.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1569" }, { "category": "external", "summary": "RHBZ#952711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952711" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1569", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1569" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1569", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1569" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994)" }, { "acknowledgments": [ { "names": [ "US-CERT" ] } ], "cve": "CVE-2013-1571", "discovery_date": "2013-06-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "973474" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Javadoc component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Javadoc. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to frame injection in HTML that is generated by Javadoc.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Frame injection in generated HTML (Javadoc, 8012375)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1571" }, { "category": "external", "summary": "RHBZ#973474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=973474" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1571", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1571" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1571", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1571" }, { "category": "external", "summary": "http://www.kb.cert.org/vuls/id/225657", "url": "http://www.kb.cert.org/vuls/id/225657" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Frame injection in generated HTML (Javadoc, 8012375)" }, { "cve": "CVE-2013-2383", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952708" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2384, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"handling of [a] glyph table\" in the International Components for Unicode (ICU) Layout Engine before 51.2.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2383" }, { "category": "external", "summary": "RHBZ#952708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952708" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2383", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2383" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2383", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2383" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986)" }, { "cve": "CVE-2013-2384", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952709" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2383, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"font layout\" in the International Components for Unicode (ICU) Layout Engine before 51.2.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2384" }, { "category": "external", "summary": "RHBZ#952709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952709" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2384", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2384" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987)" }, { "cve": "CVE-2013-2394", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953265" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2432 and CVE-2013-1491.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2394" }, { "category": "external", "summary": "RHBZ#953265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953265" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2394", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2394" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2394", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2394" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)" }, { "cve": "CVE-2013-2407", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975127" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and availability via unknown vectors related to Libraries. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"XML security and the class loader.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2407" }, { "category": "external", "summary": "RHBZ#975127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975127" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2407", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2407" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2407", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2407" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744)" }, { "cve": "CVE-2013-2412", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975144" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serviceability. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient indication of an SSL connection failure by JConsole, related to RMI connection dialog box.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JConsole SSL support (Serviceability, 8003703)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2412" }, { "category": "external", "summary": "RHBZ#975144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975144" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2412", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2412" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2412", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2412" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JConsole SSL support (Serviceability, 8003703)" }, { "cve": "CVE-2013-2417", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952657" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to Networking. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an information leak involving InetAddress serialization. CVE has not investigated the apparent discrepancy between vendor reports regarding the impact of this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2417" }, { "category": "external", "summary": "RHBZ#952657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952657" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2417", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2417" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2417", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2417" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724)" }, { "cve": "CVE-2013-2418", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953267" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2418" }, { "category": "external", "summary": "RHBZ#953267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953267" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2418", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2418" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2418", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2418" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-2419", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952656" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"font processing errors\" in the International Components for Unicode (ICU) Layout Engine before 51.2.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Layout Engine font processing errors (JDK 2D, 8001031)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2419" }, { "category": "external", "summary": "RHBZ#952656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2419", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2419" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ICU: Layout Engine font processing errors (JDK 2D, 8001031)" }, { "cve": "CVE-2013-2420", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952638" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient \"validation of images\" in share/native/sun/awt/image/awt_ImageRep.c, possibly involving offsets.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image processing vulnerability (2D, 8007617)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2420" }, { "category": "external", "summary": "RHBZ#952638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952638" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2420", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2420" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2420", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2420" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image processing vulnerability (2D, 8007617)" }, { "cve": "CVE-2013-2422", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952642" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper method-invocation restrictions by the MethodUtil trampoline class, which allows remote attackers to bypass the Java sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2422" }, { "category": "external", "summary": "RHBZ#952642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952642" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2422", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2422" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857)" }, { "cve": "CVE-2013-2424", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952509" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality via vectors related to JMX. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient class access checks\" when \"creating new instances\" using MBeanInstantiator.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2424" }, { "category": "external", "summary": "RHBZ#952509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2424", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2424" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2424", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2424" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435)" }, { "cve": "CVE-2013-2429", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952521" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"JPEGImageWriter state corruption\" when using native code, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2429" }, { "category": "external", "summary": "RHBZ#952521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2429", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2429" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2429", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2429" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918)" }, { "cve": "CVE-2013-2430", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952524" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; JavaFX 2.2.7 and earlier; and OpenJDK 6 and 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"JPEGImageReader state corruption\" when using native code.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2430" }, { "category": "external", "summary": "RHBZ#952524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2430", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2430" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2430", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2430" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667)" }, { "cve": "CVE-2013-2432", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953269" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2394 and CVE-2013-1491.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2432" }, { "category": "external", "summary": "RHBZ#953269", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953269" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2432", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2432" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)" }, { "cve": "CVE-2013-2433", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953270" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-1540.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2433" }, { "category": "external", "summary": "RHBZ#953270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953270" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2433", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2433" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2433", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2433" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-2435", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953273" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2440.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2435" }, { "category": "external", "summary": "RHBZ#953273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953273" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2435", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2435" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-2437", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975773" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2437" }, { "category": "external", "summary": "RHBZ#975773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975773" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2437", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2437" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)" }, { "cve": "CVE-2013-2440", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953275" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2435.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2440" }, { "category": "external", "summary": "RHBZ#953275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953275" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2440", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2440" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-2442", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975770" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2466 and CVE-2013-2468.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2442" }, { "category": "external", "summary": "RHBZ#975770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2442", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2442" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)" }, { "cve": "CVE-2013-2443", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975137" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2452 and CVE-2013-2455. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect \"checking order\" within the AccessControlContext class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AccessControlContext check order issue (Libraries, 8001330)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2443" }, { "category": "external", "summary": "RHBZ#975137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975137" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2443", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2443" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2443", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2443" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: AccessControlContext check order issue (Libraries, 8001330)" }, { "cve": "CVE-2013-2444", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975131" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect availability via vectors related to AWT. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not \"properly manage and restrict certain resources related to the processing of fonts,\" possibly involving temporary files.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Resource denial of service (AWT, 8001038)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2444" }, { "category": "external", "summary": "RHBZ#975131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975131" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2444", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2444" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Resource denial of service (AWT, 8001038)" }, { "cve": "CVE-2013-2446", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975132" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via vectors related to CORBA. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly enforce access restrictions for CORBA output streams.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: output stream access restrictions (CORBA, 8000642)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2446" }, { "category": "external", "summary": "RHBZ#975132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975132" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2446", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2446" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2446", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2446" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: output stream access restrictions (CORBA, 8000642)" }, { "cve": "CVE-2013-2447", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975140" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Networking. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to obtain a socket\u0027s local address via vectors involving inconsistencies between Socket.getLocalAddress and InetAddress.getLocalHost.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Prevent revealing the local address (Networking, 8001318)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2447" }, { "category": "external", "summary": "RHBZ#975140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2447", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2447" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2447", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2447" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Prevent revealing the local address (Networking, 8001318)" }, { "cve": "CVE-2013-2448", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975125" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to insufficient \"access restrictions\" and \"robustness of sound classes.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Better access restrictions (Sound, 8006328)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2448" }, { "category": "external", "summary": "RHBZ#975125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2448", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2448" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2448", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2448" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Better access restrictions (Sound, 8006328)" }, { "cve": "CVE-2013-2450", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975141" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Serialization. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper handling of circular references in ObjectStreamClass.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2450" }, { "category": "external", "summary": "RHBZ#975141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2450", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2450" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638)" }, { "cve": "CVE-2013-2451", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975146" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Networking. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper enforcement of exclusive port binds when running on Windows, which allows attackers to bind to ports that are already in use.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: exclusive port binding (Networking, 7170730)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2451" }, { "category": "external", "summary": "RHBZ#975146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975146" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2451", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2451" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2451", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2451" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: exclusive port binding (Networking, 7170730)" }, { "cve": "CVE-2013-2452", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975138" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2455. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"network address handling in virtual machine identifiers\" and the lack of \"unique and unpredictable IDs\" in the java.rmi.dgc.VMID class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Unique VMIDs (Libraries, 8001033)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2452" }, { "category": "external", "summary": "RHBZ#975138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975138" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2452", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2452" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2452", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2452" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Unique VMIDs (Libraries, 8001033)" }, { "cve": "CVE-2013-2453", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975134" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect integrity via vectors related to JMX. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to a missing check for \"package access\" by the MBeanServer Introspector.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MBeanServer Introspector package access (JMX, 8008124)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2453" }, { "category": "external", "summary": "RHBZ#975134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975134" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2453", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2453" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2453", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2453" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: MBeanServer Introspector package access (JMX, 8008124)" }, { "cve": "CVE-2013-2454", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975129" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via vectors related to JDBC. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly restrict access to certain class packages in the SerialJavaObject class, which allows remote attackers to bypass the Java sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: SerialJavaObject package restriction (JDBC, 8009554)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2454" }, { "category": "external", "summary": "RHBZ#975129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975129" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2454", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2454" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2454", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2454" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: SerialJavaObject package restriction (JDBC, 8009554)" }, { "cve": "CVE-2013-2455", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975139" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2452. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect access checks by the (1) getEnclosingClass, (2) getEnclosingMethod, and (3) getEnclosingConstructor methods.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: getEnclosing* checks (Libraries, 8007812)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2455" }, { "category": "external", "summary": "RHBZ#975139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975139" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2455", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2455" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2455", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2455" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: getEnclosing* checks (Libraries, 8007812)" }, { "cve": "CVE-2013-2456", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975142" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serialization. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper access checks for subclasses in the ObjectOutputStream class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: ObjectOutputStream access checks (Serialization, 8008132)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2456" }, { "category": "external", "summary": "RHBZ#975142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2456", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2456" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2456", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2456" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: ObjectOutputStream access checks (Serialization, 8008132)" }, { "cve": "CVE-2013-2457", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975133" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to JMX. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect implementation of \"certain class checks\" that allows remote attackers to bypass intended class restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Proper class checking (JMX, 8008120)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2457" }, { "category": "external", "summary": "RHBZ#975133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975133" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2457", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2457" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2457", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2457" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Proper class checking (JMX, 8008120)" }, { "cve": "CVE-2013-2459", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975121" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"integer overflow checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Various AWT integer overflow checks (AWT, 8009071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2459" }, { "category": "external", "summary": "RHBZ#975121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2459", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2459" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2459", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2459" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Various AWT integer overflow checks (AWT, 8009071)" }, { "cve": "CVE-2013-2463", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975115" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image attribute verification\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect image attribute verification (2D, 8012438)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2463" }, { "category": "external", "summary": "RHBZ#975115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975115" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2463", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2463" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2463", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2463" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect image attribute verification (2D, 8012438)" }, { "cve": "CVE-2013-2464", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975757" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2463, CVE-2013-2465, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, and CVE-2013-2473.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2464" }, { "category": "external", "summary": "RHBZ#975757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2464", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2464" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2464", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2464" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (2D)" }, { "cve": "CVE-2013-2465", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975118" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image channel verification\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect image channel verification (2D, 8012597)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2465" }, { "category": "external", "summary": "RHBZ#975118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975118" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2465", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2465" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2465", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2465" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-28T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect image channel verification (2D, 8012597)" }, { "cve": "CVE-2013-2466", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975764" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2442 and CVE-2013-2468.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2466" }, { "category": "external", "summary": "RHBZ#975764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975764" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2466", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2466" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)" }, { "cve": "CVE-2013-2468", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975761" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2442 and CVE-2013-2466.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2468" }, { "category": "external", "summary": "RHBZ#975761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975761" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2468", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2468" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2468", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2468" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)" }, { "cve": "CVE-2013-2469", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975120" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image layout verification\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect image layout verification (2D, 8012601)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2469" }, { "category": "external", "summary": "RHBZ#975120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2469", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2469" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2469", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2469" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect image layout verification (2D, 8012601)" }, { "cve": "CVE-2013-2470", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975099" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"ImagingLib byte lookup processing.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: ImagingLib byte lookup processing (2D, 8011243)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2470" }, { "category": "external", "summary": "RHBZ#975099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2470", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2470" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2470", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2470" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: ImagingLib byte lookup processing (2D, 8011243)" }, { "cve": "CVE-2013-2471", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975102" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect IntegerComponentRaster size checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2471" }, { "category": "external", "summary": "RHBZ#975102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975102" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2471", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2471" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2471", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2471" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248)" }, { "cve": "CVE-2013-2472", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975107" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect ShortBandedRaster size checks\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2472" }, { "category": "external", "summary": "RHBZ#975107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975107" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2472", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2472" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2472", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2472" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253)" }, { "cve": "CVE-2013-2473", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975110" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect ByteBandedRaster size checks\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2473" }, { "category": "external", "summary": "RHBZ#975110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975110" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2473", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2473" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257)" }, { "cve": "CVE-2013-3743", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975767" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 45 and earlier and 5.0 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-3743" }, { "category": "external", "summary": "RHBZ#975767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975767" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-3743", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3743" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-3743", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3743" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT)" } ] }
rhsa-2013_0625
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM\nJava Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java Runtime\nEnvironment and the IBM Java Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM Security alerts page,\nlisted in the References section. (CVE-2012-1541, CVE-2012-3213,\nCVE-2012-3342, CVE-2013-0351, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423,\nCVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428,\nCVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0438,\nCVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0445,\nCVE-2013-0446, CVE-2013-0450, CVE-2013-0809, CVE-2013-1473, CVE-2013-1476,\nCVE-2013-1478, CVE-2013-1480, CVE-2013-1481, CVE-2013-1486, CVE-2013-1487,\nCVE-2013-1493)\n\nAll users of java-1.6.0-ibm are advised to upgrade to these updated\npackages, containing the IBM Java SE 6 SR13 release. All running instances\nof IBM Java must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0625", "url": "https://access.redhat.com/errata/RHSA-2013:0625" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://www.ibm.com/developerworks/java/jdk/alerts/", "url": "https://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "906914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914" }, { "category": "external", "summary": "906916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916" }, { "category": "external", "summary": "906917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917" }, { "category": "external", "summary": "906918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918" }, { "category": "external", "summary": "906921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921" }, { "category": "external", "summary": "906923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923" }, { "category": "external", "summary": "906933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933" }, { "category": "external", "summary": "906935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935" }, { "category": "external", "summary": "907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "907223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223" }, { "category": "external", "summary": "907224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224" }, { "category": "external", "summary": "907226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226" }, { "category": "external", "summary": "907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "913014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913014" }, { "category": "external", "summary": "913030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913030" }, { "category": "external", "summary": "917550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917550" }, { "category": "external", "summary": "917553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917553" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0625.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-ibm security update", "tracking": { "current_release_date": "2024-12-08T10:37:03+00:00", "generator": { "date": "2024-12-08T10:37:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2013:0625", "initial_release_date": "2013-03-11T18:47:00+00:00", "revision_history": [ { "date": "2013-03-11T18:47:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-11-14T19:15:10+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-08T10:37:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.13.0-1jpp.2.el5_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "product_id": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.13.0-1jpp.2.el5_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.13.0-1jpp.2.el5_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.13.0-1jpp.2.el5_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.13.0-1jpp.2.el5_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.13.0-1jpp.2.el5_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.13.0-1jpp.3.el6_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.13.0-1jpp.3.el6_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "product_id": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.13.0-1jpp.3.el6_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.13.0-1jpp.3.el6_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.13.0-1jpp.3.el6_4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "product_id": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.13.0-1jpp.2.el5_9?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "product": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "product_id": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.13.0-1jpp.2.el5_9?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.13.0-1jpp.2.el5_9?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.13.0-1jpp.2.el5_9?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.13.0-1jpp.2.el5_9?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.13.0-1jpp.3.el6_4?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.13.0-1jpp.2.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product_id": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.13.0-1jpp.2.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product_id": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.13.0-1jpp.2.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.13.0-1jpp.2.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.13.0-1jpp.2.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.13.0-1jpp.2.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.13.0-1jpp.2.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.13.0-1jpp.2.el5_9?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.13.0-1jpp.2.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.13.0-1jpp.2.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.13.0-1jpp.2.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.13.0-1jpp.2.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.13.0-1jpp.2.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.13.0-1jpp.2.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.13.0-1jpp.2.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.13.0-1jpp.2.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.13.0-1jpp.3.el6_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.13.0-1jpp.3.el6_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.13.0-1jpp.3.el6_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.13.0-1jpp.3.el6_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.13.0-1jpp.3.el6_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.13.0-1jpp.3.el6_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.13.0-1jpp.3.el6_4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.13.0-1jpp.2.el5_9?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product_id": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.13.0-1jpp.2.el5_9?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product_id": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.13.0-1jpp.2.el5_9?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.13.0-1jpp.2.el5_9?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.13.0-1jpp.2.el5_9?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.13.0-1jpp.2.el5_9?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.13.0-1jpp.2.el5_9?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.13.0-1jpp.2.el5_9?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.13.0-1jpp.3.el6_4?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.13.0-1jpp.2.el5_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "product_id": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.13.0-1jpp.2.el5_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.13.0-1jpp.2.el5_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.13.0-1jpp.2.el5_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.13.0-1jpp.2.el5_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.13.0-1jpp.2.el5_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "product_id": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.13.0-1jpp.3.el6_4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.13.0-1jpp.3.el6_4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.13.0-1jpp.3.el6_4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.13.0-1jpp.3.el6_4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.13.0-1jpp.3.el6_4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.13.0-1jpp.3.el6_4?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.13.0-1jpp.3.el6_4?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product_id": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.13.0-1jpp.3.el6_4?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.13.0-1jpp.3.el6_4?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product_id": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.13.0-1jpp.3.el6_4?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.13.0-1jpp.3.el6_4?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.13.0-1jpp.3.el6_4?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.13.0-1jpp.3.el6_4?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.4.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-1541", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906914" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1541" }, { "category": "external", "summary": "RHBZ#906914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1541", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2012-3213", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907223" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3213" }, { "category": "external", "summary": "RHBZ#907223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3213", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)" }, { "cve": "CVE-2012-3342", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906917" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3342" }, { "category": "external", "summary": "RHBZ#906917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3342", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2012-5085", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865541" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote authenticated users to have an unspecified impact via unknown vectors related to Networking. NOTE: the Oracle CPU states that this issue has a 0.0 CVSS score. If so, then this is not a vulnerability and this issue should not be included in CVE.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: disable Gopher support by default (Gopher, 7189567)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5085" }, { "category": "external", "summary": "RHBZ#865541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865541" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5085", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5085" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5085", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5085" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: disable Gopher support by default (Gopher, 7189567)" }, { "cve": "CVE-2013-0351", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906923" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0351" }, { "category": "external", "summary": "RHBZ#906923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0351", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0409", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907226" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38 allows remote attackers to affect confidentiality via vectors related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0409" }, { "category": "external", "summary": "RHBZ#907226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0409", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0409" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)" }, { "cve": "CVE-2013-0419", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906918" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0419" }, { "category": "external", "summary": "RHBZ#906918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0419", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0423", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906921" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0423" }, { "category": "external", "summary": "RHBZ#906921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0423", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0424", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906813" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0424" }, { "category": "external", "summary": "RHBZ#906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0424", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0424" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)" }, { "cve": "CVE-2013-0425", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907344" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0425" }, { "category": "external", "summary": "RHBZ#907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0425", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0425" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)" }, { "cve": "CVE-2013-0426", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907346" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0426" }, { "category": "external", "summary": "RHBZ#907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0426", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0426" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)" }, { "cve": "CVE-2013-0427", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907455" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0427" }, { "category": "external", "summary": "RHBZ#907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)" }, { "cve": "CVE-2013-0428", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907207" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"incorrect checks for proxy classes\" in the Reflection API.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0428" }, { "category": "external", "summary": "RHBZ#907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0428", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)" }, { "cve": "CVE-2013-0432", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907219" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient clipboard access premission checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0432" }, { "category": "external", "summary": "RHBZ#907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0432", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)" }, { "cve": "CVE-2013-0433", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907456" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0433" }, { "category": "external", "summary": "RHBZ#907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0433", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0433" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)" }, { "cve": "CVE-2013-0434", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907453" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0434" }, { "category": "external", "summary": "RHBZ#907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0434", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0434" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)" }, { "cve": "CVE-2013-0435", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906892" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0435" }, { "category": "external", "summary": "RHBZ#906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0435", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)" }, { "cve": "CVE-2013-0438", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906935" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0438" }, { "category": "external", "summary": "RHBZ#906935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0438", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0438" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0440", "discovery_date": "2012-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "859140" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0440" }, { "category": "external", "summary": "RHBZ#859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0440", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)" }, { "cve": "CVE-2013-0441", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907458" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka \"missing serialization restriction.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing serialization restriction (CORBA, 7201066)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0441" }, { "category": "external", "summary": "RHBZ#907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0441", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0441" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing serialization restriction (CORBA, 7201066)" }, { "cve": "CVE-2013-0442", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906899" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0442" }, { "category": "external", "summary": "RHBZ#906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0442", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)" }, { "cve": "CVE-2013-0443", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907340" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a \"small subgroup attack\" to force the use of weak session keys or obtain sensitive information about the private key.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0443" }, { "category": "external", "summary": "RHBZ#907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0443", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0443" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)" }, { "cve": "CVE-2013-0445", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906900" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0445" }, { "category": "external", "summary": "RHBZ#906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0445", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)" }, { "cve": "CVE-2013-0446", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906916" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0446" }, { "category": "external", "summary": "RHBZ#906916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0446", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0446" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0450", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906911" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of \"access control context\" in the JMX RequiredModelMBean class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0450" }, { "category": "external", "summary": "RHBZ#906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0450", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)" }, { "cve": "CVE-2013-0809", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2013-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "917550" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Specially crafted sample model integer overflow (2D, 8007014)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0809" }, { "category": "external", "summary": "RHBZ#917550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917550" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0809", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0809" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html" } ], "release_date": "2013-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Specially crafted sample model integer overflow (2D, 8007014)" }, { "cve": "CVE-2013-1473", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906933" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect integrity via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1473" }, { "category": "external", "summary": "RHBZ#906933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1473", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-1476", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907457" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via \"certain value handler constructors.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1476" }, { "category": "external", "summary": "RHBZ#907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1476", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)" }, { "cve": "CVE-2013-1478", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906894" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" that can trigger an integer overflow and memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1478" }, { "category": "external", "summary": "RHBZ#906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1478", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)" }, { "cve": "CVE-2013-1480", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906904" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" in awt_parseImage.c, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1480" }, { "category": "external", "summary": "RHBZ#906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1480", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1480" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)" }, { "cve": "CVE-2013-1481", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907224" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 (Sound)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1481" }, { "category": "external", "summary": "RHBZ#907224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1481", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1481" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 (Sound)" }, { "cve": "CVE-2013-1486", "discovery_date": "2013-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "913014" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier, 6 Update 39 and earlier, and 5.0 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1486" }, { "category": "external", "summary": "RHBZ#913014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1486", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1486" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1486", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1486" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html" } ], "release_date": "2013-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446)" }, { "cve": "CVE-2013-1487", "discovery_date": "2013-02-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "913030" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE 7 Update 13 and earlier and 6 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1487" }, { "category": "external", "summary": "RHBZ#913030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913030" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1487", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1487" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1487", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1487" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html" } ], "release_date": "2013-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment)" }, { "cve": "CVE-2013-1493", "discovery_date": "2013-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "917553" } ], "notes": [ { "category": "description", "text": "The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CMM malformed raster memory corruption (2D, 8007675)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1493" }, { "category": "external", "summary": "RHBZ#917553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917553" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1493", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1493" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1493", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1493" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html" } ], "release_date": "2013-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-11T18:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-accessibility-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.i386", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.ppc64", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.s390x", "5Server-Supplementary-5.9.Z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.2.el5_9.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Client-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6ComputeNode-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Server-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-demo-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-devel-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-javacomm-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-jdbc-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-plugin-1:1.6.0.13.0-1jpp.3.el6_4.x86_64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.i686", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.ppc64", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.s390x", "6Workstation-Supplementary-6.4.z:java-1.6.0-ibm-src-1:1.6.0.13.0-1jpp.3.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: CMM malformed raster memory corruption (2D, 8007675)" } ] }
ghsa-hv74-3r93-2vw8
Vulnerability from github
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and "Better handling of UI elements."
{ "affected": [], "aliases": [ "CVE-2013-0435" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2013-02-02T00:55:00Z", "severity": "MODERATE" }, "details": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"", "id": "GHSA-hv74-3r93-2vw8", "modified": "2022-05-05T02:49:01Z", "published": "2022-05-05T02:49:01Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16489" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19078" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19520" }, { "type": "WEB", "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056" }, { "type": "WEB", "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=906892" }, { "type": "WEB", "url": "http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS" }, { "type": "WEB", "url": "http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/c1fa21042291" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-0236.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-0237.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-0245.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-0246.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-0247.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/858729" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:095" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/57729" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2013-0435
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2013-0435", "description": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"", "id": "GSD-2013-0435", "references": [ "https://www.suse.com/security/cve/CVE-2013-0435.html", "https://access.redhat.com/errata/RHSA-2013:1456", "https://access.redhat.com/errata/RHSA-2013:1455", "https://access.redhat.com/errata/RHSA-2013:0626", "https://access.redhat.com/errata/RHSA-2013:0625", "https://access.redhat.com/errata/RHSA-2013:0247", "https://access.redhat.com/errata/RHSA-2013:0246", "https://access.redhat.com/errata/RHSA-2013:0245", "https://access.redhat.com/errata/RHSA-2013:0237", "https://access.redhat.com/errata/RHSA-2013:0236", "https://alas.aws.amazon.com/cve/html/CVE-2013-0435.html", "https://linux.oracle.com/cve/CVE-2013-0435.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2013-0435" ], "details": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"", "id": "GSD-2013-0435", "modified": "2023-12-13T01:22:15.615591Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2013-0435", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201406-32", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "MDVSA-2013:095", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:095" }, { "name": "SSRT101156", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2" }, { "name": "TA13-032A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html" }, { "name": "oval:org.mitre.oval:def:19520", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19520" }, { "name": "RHSA-2013:0236", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0236.html" }, { "name": "RHSA-2013:1455", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html" }, { "name": "VU#858729", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/858729" }, { "name": "RHSA-2013:0237", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0237.html" }, { "name": "HPSBUX02857", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2" }, { "name": "57729", "refsource": "BID", "url": "http://www.securityfocus.com/bid/57729" }, { "name": "RHSA-2013:0247", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0247.html" }, { "name": "http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/c1fa21042291", "refsource": "CONFIRM", "url": "http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/c1fa21042291" }, { "name": "oval:org.mitre.oval:def:16489", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16489" }, { "name": "HPSBMU02874", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2" }, { "name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=906892", "refsource": "CONFIRM", "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=906892" }, { "name": "SSRT101103", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2" }, { "name": "openSUSE-SU-2013:0312", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" }, { "name": "openSUSE-SU-2013:0377", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" }, { "name": "RHSA-2013:0246", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0246.html" }, { "name": "RHSA-2013:1456", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html" }, { "name": "HPSBUX02864", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2" }, { "name": "RHSA-2013:0245", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0245.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" }, { "name": "http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS", "refsource": "CONFIRM", "url": "http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS" }, { "name": "SSRT101184", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2" }, { "name": "oval:org.mitre.oval:def:19078", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19078" }, { "name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056", "refsource": "CONFIRM", "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2013-0435" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" }, { "name": "RHSA-2013:0237", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0237.html" }, { "name": "RHSA-2013:0236", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0236.html" }, { "name": "TA13-032A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html" }, { "name": "VU#858729", "refsource": "CERT-VN", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/858729" }, { "name": "RHSA-2013:0245", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0245.html" }, { "name": "RHSA-2013:0247", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0247.html" }, { "name": "http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS", "refsource": "CONFIRM", "tags": [], "url": "http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS" }, { "name": "http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/c1fa21042291", "refsource": "CONFIRM", "tags": [], "url": "http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/c1fa21042291" }, { "name": "RHSA-2013:0246", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0246.html" }, { "name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=906892", "refsource": "CONFIRM", "tags": [], "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=906892" }, { "name": "openSUSE-SU-2013:0377", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" }, { "name": "openSUSE-SU-2013:0312", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" }, { "name": "HPSBUX02857", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2" }, { "name": "SSRT101156", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2" }, { "name": "HPSBMU02874", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2" }, { "name": "RHSA-2013:1455", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html" }, { "name": "RHSA-2013:1456", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html" }, { "name": "MDVSA-2013:095", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:095" }, { "name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056", "refsource": "CONFIRM", "tags": [], "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056" }, { "name": "GLSA-201406-32", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "57729", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/57729" }, { "name": "oval:org.mitre.oval:def:19520", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19520" }, { "name": "oval:org.mitre.oval:def:19078", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19078" }, { "name": "oval:org.mitre.oval:def:16489", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16489" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2022-05-13T14:52Z", "publishedDate": "2013-02-02T00:55Z" } } }
var-201302-0236
Vulnerability from variot
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and "Better handling of UI elements.". The vulnerability can be exploited over multiple protocols. Note: This issue was previously discussed in BID 57670 (Oracle Java Runtime Environment Multiple Security Vulnerabilities) but has been given its own record to better document it. This vulnerability affects the following supported versions: 7 Update 11, 6 Update 38. ----------------------------------------------------------------------
Get a tax break on purchases of Secunia Solutions!
If you are a U.S. company, you may be qualified for a tax break for your software purchases. Learn more at: http://secunia.com/products/corporate/vim/section_179/
TITLE: Hitachi Cosminexus Products Java Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA43627
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43627/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43627
RELEASE DATE: 2011-03-08
DISCUSS ADVISORY: http://secunia.com/advisories/43627/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/43627/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=43627
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Hitachi has acknowledged some vulnerabilities in Hitachi Cosminexus products, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
The vulnerabilities are caused due to vulnerabilities in the bundled version of Cosminexus Developer's Kit for Java.
For more information: SA43262
Please see the vendor's advisory for a full list of affected products. Please see vendor advisory for more details.
ORIGINAL ADVISORY: Hitachi (English): http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html
Hitachi (Japanese): http://www.hitachi.co.jp/Prod/comp/soft1/security/info/./vuls/HS11-003/index.html
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
APPLE-SA-2013-02-19-1 Java for OS X 2013-001 and Mac OS X v10.6 Update 13
Java for OS X 2013-001 and Mac OS X v10.6 Update 13 is now available and addresses the following:
Java Available for: OS X Lion v10.7 or later, OS X Lion Server v10.7 or later, OS X Mountain Lion 10.8 or later Impact: Multiple vulnerabilities in Java 1.6.0_37 Description: Multiple vulnerabilities existed in Java 1.6.0_37, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. For Mac OS X v10.6 systems, these issues were addressed in Java for Mac OS X v10.6 Update 13. Further information is available via the Java website at http://www.oracle.com/technetwork/java/javase/ releasenotes-136954.html CVE-ID CVE-2012-3213 CVE-2012-3342 CVE-2013-0351 CVE-2013-0409 CVE-2013-0419 CVE-2013-0423 CVE-2013-0424 CVE-2013-0425 CVE-2013-0426 CVE-2013-0427 CVE-2013-0428 CVE-2013-0429 CVE-2013-0432 CVE-2013-0433 CVE-2013-0434 CVE-2013-0435 CVE-2013-0438 CVE-2013-0440 CVE-2013-0441 CVE-2013-0442 CVE-2013-0443 CVE-2013-0445 CVE-2013-0446 CVE-2013-0450 CVE-2013-1473 CVE-2013-1475 CVE-2013-1476 CVE-2013-1478 CVE-2013-1480 CVE-2013-1481
Java Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 or later, OS X Lion Server v10.7 or later, OS X Mountain Lion 10.8 or later Impact: Multiple vulnerabilities in Java Description: Multiple vulnerabilities existed in Java, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Further information is available via the Java website at http://www.o racle.com/technetwork/java/javase/releasenotes-136954.html CVE-ID CVE-2013-1486 CVE-2013-1487 CVE-2013-1488
Malware removal Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 or later, OS X Lion Server v10.7 or later, OS X Mountain Lion 10.8 or later Description: This update runs a malware removal tool that will remove the most common variants of malware. If malware is found, it presents a dialog notifying the user that malware was removed. There is no indication to the user if malware is not found.
Java for OS X 2013-001 and Java for Mac OS X 10.6 Update 13 may be obtained from the Software Update pane in System Preferences, Mac App Store, or Apple's Software Downloads web site: http://www.apple.com/support/downloads/
For Mac OS X v10.6 systems The download file is named: JavaForMacOSX10.6.Update13.dmg Its SHA-1 digest is: 5327984bc0b300c237fe69cecf69513624f56b0e
For OS X Lion and Mountain Lion systems The download file is named: JavaForOSX2013-001.dmg Its SHA-1 digest is: 145d74354241cf2f567d2768bbd0a7185e7d308a
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org
iQIcBAEBAgAGBQJRI/A/AAoJEPefwLHPlZEwDp4QAKz9nfo397KaudpFDey26bsb GNR8HQ3Z5Ln0ArgwBcc2XabzIYXsjmY7nPdZgq1m0sWgFGWtfQ7qslRooUyNLOsB WUddu+hQYvPn3CJOZsaPfTA2mfK6Qk9LeyqzUUkZrRNltHnIFMO7uXLEIdrFdnnx exFMPjbIq+xM5UZgvd/2grtF4DaZHnbcK+t/tDwH09/hGRQ+l+3a/3FB2S1Av85c FSuiieyrz2NNnDwFCj5NeSFQuK7hr52TiSOEPYI2eiTepyBHrUy03wAe8uwIzQII RjkY3Nbc8AZt0Q6lq5TgsQbH+vrwVE07nty36uMKmE2vJXyOAIZjfrrwv9SetLwd QnU5NYMbeHAHmSN5JQfuvDxEfL15/7Jafw2noJGotdrMzs6XQACFIHKqLORdwNkp sltj3LwykpcyoCR8Dq7NPafqhp2wySaHX8DFSohcq1aa1w+SLDgPCZUAzknwokCL f/hVQzP6hD0uHP/2jsLjh5g6TgHmCRdR+CKCs7QZaYAUketelRX9YOcgcXzqf5sy EcbDvJ+rd3KsQ9gIByGwVhHD87NSZDJAyG0ROjMMS9w/7l7nhGxedzGzlyK3oNl/ VpewgZ8FpUrvY80HOPz5XyFmX+HQoSnJ8er6OI5AvHBPn+Z1yHDLS5zpLeDD/wO9 rmbzMJjZUnlCDXoLEVQ9 =qlVo -----END PGP SIGNATURE----- . In a typical operating environment, these are of low security risk as the runtime is not used on untrusted applets. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201406-32
http://security.gentoo.org/
Severity: High Title: IcedTea JDK: Multiple vulnerabilities Date: June 29, 2014 Bugs: #312297, #330205, #340819, #346799, #352035, #353418, #354231, #355127, #370787, #387637, #404095, #421031, #429522, #433389, #438750, #442478, #457206, #458410, #461714, #466822, #477210, #489570, #508270 ID: 201406-32
Synopsis
Multiple vulnerabilities have been found in the IcedTea JDK, the worst of which could lead to arbitrary code execution.
Background
IcedTea is a distribution of the Java OpenJDK source code built with free build tools.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-java/icedtea-bin < 6.1.13.3 >= 6.1.13.3
Description
Multiple vulnerabilities have been discovered in the IcedTea JDK. Please review the CVE identifiers referenced below for details.
Impact
A remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, obtain sensitive information, bypass intended security policies, or have other unspecified impact.
Workaround
There is no known workaround at this time.
Resolution
All IcedTea JDK users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/icedtea-bin-6.1.13.3"
References
[ 1 ] CVE-2009-3555 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555 [ 2 ] CVE-2010-2548 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2548 [ 3 ] CVE-2010-2783 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2783 [ 4 ] CVE-2010-3541 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3541 [ 5 ] CVE-2010-3548 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3548 [ 6 ] CVE-2010-3549 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3549 [ 7 ] CVE-2010-3551 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3551 [ 8 ] CVE-2010-3553 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3553 [ 9 ] CVE-2010-3554 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3554 [ 10 ] CVE-2010-3557 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3557 [ 11 ] CVE-2010-3561 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3561 [ 12 ] CVE-2010-3562 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3562 [ 13 ] CVE-2010-3564 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3564 [ 14 ] CVE-2010-3565 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3565 [ 15 ] CVE-2010-3566 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3566 [ 16 ] CVE-2010-3567 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3567 [ 17 ] CVE-2010-3568 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3568 [ 18 ] CVE-2010-3569 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3569 [ 19 ] CVE-2010-3573 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3573 [ 20 ] CVE-2010-3574 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3574 [ 21 ] CVE-2010-3860 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3860 [ 22 ] CVE-2010-4351 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4351 [ 23 ] CVE-2010-4448 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4448 [ 24 ] CVE-2010-4450 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4450 [ 25 ] CVE-2010-4465 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4465 [ 26 ] CVE-2010-4467 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4467 [ 27 ] CVE-2010-4469 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4469 [ 28 ] CVE-2010-4470 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4470 [ 29 ] CVE-2010-4471 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4471 [ 30 ] CVE-2010-4472 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4472 [ 31 ] CVE-2010-4476 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4476 [ 32 ] CVE-2011-0025 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0025 [ 33 ] CVE-2011-0706 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0706 [ 34 ] CVE-2011-0815 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0815 [ 35 ] CVE-2011-0822 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0822 [ 36 ] CVE-2011-0862 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0862 [ 37 ] CVE-2011-0864 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0864 [ 38 ] CVE-2011-0865 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0865 [ 39 ] CVE-2011-0868 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0868 [ 40 ] CVE-2011-0869 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0869 [ 41 ] CVE-2011-0870 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0870 [ 42 ] CVE-2011-0871 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0871 [ 43 ] CVE-2011-0872 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0872 [ 44 ] CVE-2011-3389 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389 [ 45 ] CVE-2011-3521 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3521 [ 46 ] CVE-2011-3544 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3544 [ 47 ] CVE-2011-3547 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3547 [ 48 ] CVE-2011-3548 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3548 [ 49 ] CVE-2011-3551 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3551 [ 50 ] CVE-2011-3552 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3552 [ 51 ] CVE-2011-3553 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3553 [ 52 ] CVE-2011-3554 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3554 [ 53 ] CVE-2011-3556 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3556 [ 54 ] CVE-2011-3557 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3557 [ 55 ] CVE-2011-3558 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3558 [ 56 ] CVE-2011-3560 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3560 [ 57 ] CVE-2011-3563 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3563 [ 58 ] CVE-2011-3571 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3571 [ 59 ] CVE-2011-5035 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5035 [ 60 ] CVE-2012-0497 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0497 [ 61 ] CVE-2012-0501 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0501 [ 62 ] CVE-2012-0502 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0502 [ 63 ] CVE-2012-0503 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0503 [ 64 ] CVE-2012-0505 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0505 [ 65 ] CVE-2012-0506 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0506 [ 66 ] CVE-2012-0547 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0547 [ 67 ] CVE-2012-1711 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1711 [ 68 ] CVE-2012-1713 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1713 [ 69 ] CVE-2012-1716 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1716 [ 70 ] CVE-2012-1717 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1717 [ 71 ] CVE-2012-1718 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1718 [ 72 ] CVE-2012-1719 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1719 [ 73 ] CVE-2012-1723 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1723 [ 74 ] CVE-2012-1724 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1724 [ 75 ] CVE-2012-1725 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1725 [ 76 ] CVE-2012-1726 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1726 [ 77 ] CVE-2012-3216 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3216 [ 78 ] CVE-2012-3422 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3422 [ 79 ] CVE-2012-3423 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3423 [ 80 ] CVE-2012-4416 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4416 [ 81 ] CVE-2012-4540 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4540 [ 82 ] CVE-2012-5068 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5068 [ 83 ] CVE-2012-5069 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5069 [ 84 ] CVE-2012-5070 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5070 [ 85 ] CVE-2012-5071 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5071 [ 86 ] CVE-2012-5072 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5072 [ 87 ] CVE-2012-5073 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5073 [ 88 ] CVE-2012-5074 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5074 [ 89 ] CVE-2012-5075 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5075 [ 90 ] CVE-2012-5076 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5076 [ 91 ] CVE-2012-5077 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5077 [ 92 ] CVE-2012-5081 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5081 [ 93 ] CVE-2012-5084 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5084 [ 94 ] CVE-2012-5085 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5085 [ 95 ] CVE-2012-5086 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5086 [ 96 ] CVE-2012-5087 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5087 [ 97 ] CVE-2012-5089 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5089 [ 98 ] CVE-2012-5979 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5979 [ 99 ] CVE-2013-0169 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169 [ 100 ] CVE-2013-0401 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0401 [ 101 ] CVE-2013-0424 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0424 [ 102 ] CVE-2013-0425 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0425 [ 103 ] CVE-2013-0426 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0426 [ 104 ] CVE-2013-0427 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0427 [ 105 ] CVE-2013-0428 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0428 [ 106 ] CVE-2013-0429 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0429 [ 107 ] CVE-2013-0431 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0431 [ 108 ] CVE-2013-0432 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0432 [ 109 ] CVE-2013-0433 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0433 [ 110 ] CVE-2013-0434 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0434 [ 111 ] CVE-2013-0435 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0435 [ 112 ] CVE-2013-0440 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0440 [ 113 ] CVE-2013-0441 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0441 [ 114 ] CVE-2013-0442 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0442 [ 115 ] CVE-2013-0443 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0443 [ 116 ] CVE-2013-0444 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0444 [ 117 ] CVE-2013-0450 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0450 [ 118 ] CVE-2013-0809 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0809 [ 119 ] CVE-2013-1475 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1475 [ 120 ] CVE-2013-1476 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1476 [ 121 ] CVE-2013-1478 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1478 [ 122 ] CVE-2013-1480 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1480 [ 123 ] CVE-2013-1484 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1484 [ 124 ] CVE-2013-1485 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1485 [ 125 ] CVE-2013-1486 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1486 [ 126 ] CVE-2013-1488 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1488 [ 127 ] CVE-2013-1493 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1493 [ 128 ] CVE-2013-1500 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1500 [ 129 ] CVE-2013-1518 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1518 [ 130 ] CVE-2013-1537 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1537 [ 131 ] CVE-2013-1557 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1557 [ 132 ] CVE-2013-1569 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1569 [ 133 ] CVE-2013-1571 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1571 [ 134 ] CVE-2013-2383 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2383 [ 135 ] CVE-2013-2384 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2384 [ 136 ] CVE-2013-2407 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2407 [ 137 ] CVE-2013-2412 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2412 [ 138 ] CVE-2013-2415 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2415 [ 139 ] CVE-2013-2417 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2417 [ 140 ] CVE-2013-2419 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2419 [ 141 ] CVE-2013-2420 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2420 [ 142 ] CVE-2013-2421 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2421 [ 143 ] CVE-2013-2422 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2422 [ 144 ] CVE-2013-2423 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2423 [ 145 ] CVE-2013-2424 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2424 [ 146 ] CVE-2013-2426 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2426 [ 147 ] CVE-2013-2429 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2429 [ 148 ] CVE-2013-2430 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2430 [ 149 ] CVE-2013-2431 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2431 [ 150 ] CVE-2013-2436 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2436 [ 151 ] CVE-2013-2443 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2443 [ 152 ] CVE-2013-2444 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2444 [ 153 ] CVE-2013-2445 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2445 [ 154 ] CVE-2013-2446 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2446 [ 155 ] CVE-2013-2447 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2447 [ 156 ] CVE-2013-2448 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2448 [ 157 ] CVE-2013-2449 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2449 [ 158 ] CVE-2013-2450 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2450 [ 159 ] CVE-2013-2451 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2451 [ 160 ] CVE-2013-2452 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2452 [ 161 ] CVE-2013-2453 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2453 [ 162 ] CVE-2013-2454 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2454 [ 163 ] CVE-2013-2455 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2455 [ 164 ] CVE-2013-2456 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2456 [ 165 ] CVE-2013-2457 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2457 [ 166 ] CVE-2013-2458 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2458 [ 167 ] CVE-2013-2459 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2459 [ 168 ] CVE-2013-2460 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2460 [ 169 ] CVE-2013-2461 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2461 [ 170 ] CVE-2013-2463 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2463 [ 171 ] CVE-2013-2465 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2465 [ 172 ] CVE-2013-2469 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2469 [ 173 ] CVE-2013-2470 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2470 [ 174 ] CVE-2013-2471 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2471 [ 175 ] CVE-2013-2472 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2472 [ 176 ] CVE-2013-2473 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2473 [ 177 ] CVE-2013-3829 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3829 [ 178 ] CVE-2013-4002 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4002 [ 179 ] CVE-2013-5772 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5772 [ 180 ] CVE-2013-5774 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5774 [ 181 ] CVE-2013-5778 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5778 [ 182 ] CVE-2013-5780 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5780 [ 183 ] CVE-2013-5782 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5782 [ 184 ] CVE-2013-5783 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5783 [ 185 ] CVE-2013-5784 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5784 [ 186 ] CVE-2013-5790 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5790 [ 187 ] CVE-2013-5797 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5797 [ 188 ] CVE-2013-5800 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5800 [ 189 ] CVE-2013-5802 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5802 [ 190 ] CVE-2013-5803 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5803 [ 191 ] CVE-2013-5804 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5804 [ 192 ] CVE-2013-5805 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5805 [ 193 ] CVE-2013-5806 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5806 [ 194 ] CVE-2013-5809 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5809 [ 195 ] CVE-2013-5814 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5814 [ 196 ] CVE-2013-5817 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5817 [ 197 ] CVE-2013-5820 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5820 [ 198 ] CVE-2013-5823 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5823 [ 199 ] CVE-2013-5825 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5825 [ 200 ] CVE-2013-5829 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5829 [ 201 ] CVE-2013-5830 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5830 [ 202 ] CVE-2013-5840 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5840 [ 203 ] CVE-2013-5842 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5842 [ 204 ] CVE-2013-5849 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5849 [ 205 ] CVE-2013-5850 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5850 [ 206 ] CVE-2013-5851 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5851 [ 207 ] CVE-2013-6629 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6629 [ 208 ] CVE-2013-6954 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6954 [ 209 ] CVE-2014-0429 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0429 [ 210 ] CVE-2014-0446 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0446 [ 211 ] CVE-2014-0451 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0451 [ 212 ] CVE-2014-0452 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0452 [ 213 ] CVE-2014-0453 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0453 [ 214 ] CVE-2014-0456 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0456 [ 215 ] CVE-2014-0457 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0457 [ 216 ] CVE-2014-0458 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0458 [ 217 ] CVE-2014-0459 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459 [ 218 ] CVE-2014-0460 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0460 [ 219 ] CVE-2014-0461 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0461 [ 220 ] CVE-2014-1876 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1876 [ 221 ] CVE-2014-2397 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2397 [ 222 ] CVE-2014-2398 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2398 [ 223 ] CVE-2014-2403 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2403 [ 224 ] CVE-2014-2412 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2412 [ 225 ] CVE-2014-2414 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2414 [ 226 ] CVE-2014-2421 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2421 [ 227 ] CVE-2014-2423 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2423 [ 228 ] CVE-2014-2427 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2427
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201406-32.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . Download and install the updates from The HP Software Support Online (SSO). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Critical: java-1.6.0-openjdk security update Advisory ID: RHSA-2013:0245-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0245.html Issue date: 2013-02-08 CVE Names: CVE-2013-0424 CVE-2013-0425 CVE-2013-0426 CVE-2013-0427 CVE-2013-0428 CVE-2013-0429 CVE-2013-0432 CVE-2013-0433 CVE-2013-0434 CVE-2013-0435 CVE-2013-0440 CVE-2013-0441 CVE-2013-0442 CVE-2013-0443 CVE-2013-0445 CVE-2013-0450 CVE-2013-1475 CVE-2013-1476 CVE-2013-1478 CVE-2013-1480 =====================================================================
- Summary:
Updated java-1.6.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
- Description:
These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit.
Multiple improper permission check issues were discovered in the AWT, CORBA, JMX, and Libraries components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441, CVE-2013-1475, CVE-2013-1476, CVE-2013-0429, CVE-2013-0450, CVE-2013-0425, CVE-2013-0426, CVE-2013-0428)
Multiple flaws were found in the way image parsers in the 2D and AWT components handled image raster parameters. A specially-crafted image could cause Java Virtual Machine memory corruption and, possibly, lead to arbitrary code execution with the virtual machine privileges. (CVE-2013-1478, CVE-2013-1480)
A flaw was found in the AWT component's clipboard handling code. An untrusted Java application or applet could use this flaw to access clipboard data, bypassing Java sandbox restrictions. (CVE-2013-0432)
The default Java security properties configuration did not restrict access to certain com.sun.xml.internal packages. An untrusted Java application or applet could use this flaw to access information, bypassing certain Java sandbox restrictions. This update lists the whole package as restricted. (CVE-2013-0435)
Multiple improper permission check issues were discovered in the Libraries, Networking, and JAXP components. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2013-0427, CVE-2013-0433, CVE-2013-0434)
It was discovered that the RMI component's CGIHandler class used user inputs in error messages without any sanitization. An attacker could use this flaw to perform a cross-site scripting (XSS) attack. (CVE-2013-0424)
It was discovered that the SSL/TLS implementation in the JSSE component did not properly enforce handshake message ordering, allowing an unlimited number of handshake restarts. A remote attacker could use this flaw to make an SSL/TLS server using JSSE consume an excessive amount of CPU by continuously restarting the handshake. (CVE-2013-0440)
It was discovered that the JSSE component did not properly validate Diffie-Hellman public keys. An SSL/TLS client could possibly use this flaw to perform a small subgroup attack. (CVE-2013-0443)
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.
This erratum also upgrades the OpenJDK package to IcedTea6 1.11.6. Refer to the NEWS file, linked to in the References, for further information.
All users of java-1.6.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258
- Bugs fixed (http://bugzilla.redhat.com/):
859140 - CVE-2013-0440 OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393) 860652 - CVE-2013-1475 OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50) 906813 - CVE-2013-0424 OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318) 906892 - CVE-2013-0435 OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068) 906894 - CVE-2013-1478 OpenJDK: image parser insufficient raster parameter checks (2D, 8001972) 906899 - CVE-2013-0442 OpenJDK: insufficient privilege checking issue (AWT, 7192977) 906900 - CVE-2013-0445 OpenJDK: insufficient privilege checking issue (AWT, 8001057) 906904 - CVE-2013-1480 OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325) 906911 - CVE-2013-0450 OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537) 907207 - CVE-2013-0428 OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29) 907219 - CVE-2013-0432 OpenJDK: insufficient clipboard access premission checks (AWT, 7186952) 907340 - CVE-2013-0443 OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392) 907344 - CVE-2013-0425 OpenJDK: logging insufficient access control checks (Libraries, 6664509) 907346 - CVE-2013-0426 OpenJDK: logging insufficient access control checks (Libraries, 6664528) 907453 - CVE-2013-0434 OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235) 907455 - CVE-2013-0427 OpenJDK: invalid threads subject to interrupts (Libraries, 6776941) 907456 - CVE-2013-0433 OpenJDK: InetSocketAddress serialization issue (Networking, 7201071) 907457 - CVE-2013-1476 OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631) 907458 - CVE-2013-0441 OpenJDK: missing serialization restriction (CORBA, 7201066) 907460 - CVE-2013-0429 OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694)
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.src.rpm
i386: java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm
x86_64: java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.src.rpm
i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.src.rpm
x86_64: java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.src.rpm
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.src.rpm
i386: java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm
x86_64: java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.src.rpm
i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.src.rpm
i386: java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm
x86_64: java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.src.rpm
i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2013-0424.html https://www.redhat.com/security/data/cve/CVE-2013-0425.html https://www.redhat.com/security/data/cve/CVE-2013-0426.html https://www.redhat.com/security/data/cve/CVE-2013-0427.html https://www.redhat.com/security/data/cve/CVE-2013-0428.html https://www.redhat.com/security/data/cve/CVE-2013-0429.html https://www.redhat.com/security/data/cve/CVE-2013-0432.html https://www.redhat.com/security/data/cve/CVE-2013-0433.html https://www.redhat.com/security/data/cve/CVE-2013-0434.html https://www.redhat.com/security/data/cve/CVE-2013-0435.html https://www.redhat.com/security/data/cve/CVE-2013-0440.html https://www.redhat.com/security/data/cve/CVE-2013-0441.html https://www.redhat.com/security/data/cve/CVE-2013-0442.html https://www.redhat.com/security/data/cve/CVE-2013-0443.html https://www.redhat.com/security/data/cve/CVE-2013-0445.html https://www.redhat.com/security/data/cve/CVE-2013-0450.html https://www.redhat.com/security/data/cve/CVE-2013-1475.html https://www.redhat.com/security/data/cve/CVE-2013-1476.html https://www.redhat.com/security/data/cve/CVE-2013-1478.html https://www.redhat.com/security/data/cve/CVE-2013-1480.html https://access.redhat.com/security/updates/classification/#critical http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFRFVVkXlSAg2UNWIIRAj6IAJ9pyNWKcES0d/HAkxu8/nazgM+tGgCgsH48 491W7PbYZVogid5QvYiYwv8= =d0CL -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Further information about these flaws can be found on the Oracle Java SE Critical Patch Update Advisory page, listed in the References section. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03725347
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03725347 Version: 1
HPSBUX02864 SSRT101156 rev.1 - HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2013-04-03 Last Updated: 2013-04-03
Potential Security Impact: Remote unauthorized access, disclosure of information, and other vulnerabilities
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified in Java Runtime Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow remote unauthorized access, disclosure of information, and other exploits. HP-UX B.11.11, B.11.23, and B.11.31 running HP JDK and JRE v6.0.17 and earlier
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2012-1541 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2012-3213 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2012-3342 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2013-0351 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2013-0409 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2013-0419 (AV:N/AC:H/Au:N/C:C/I:C/A:C) 7.6 CVE-2013-0423 (AV:N/AC:H/Au:N/C:C/I:C/A:C) 7.6 CVE-2013-0424 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2013-0425 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2013-0426 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2013-0427 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2013-0428 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2013-0429 (AV:N/AC:H/Au:N/C:C/I:C/A:C) 7.6 CVE-2013-0432 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4 CVE-2013-0433 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2013-0434 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2013-0435 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2013-0438 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2013-0440 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2013-0441 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2013-0442 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2013-0443 (AV:N/AC:H/Au:N/C:P/I:P/A:N) 4.0 CVE-2013-0445 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2013-0446 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2013-0450 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2013-0809 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2013-1473 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2013-1475 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2013-1476 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2013-1478 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2013-1480 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2013-1481 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2013-1493 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following Java version upgrade to resolve these vulnerabilities. The upgrade is available from the following location
http://www.hp.com/java
OS Version Release Version
HP-UX B.11.11, B.11.23, B.11.31 JDK and JRE v6.0.18 or subsequent
MANUAL ACTIONS: Yes - Update For Java v6.0 update to Java v6.0.18 or subsequent
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS
HP-UX B.11.11 HP-UX B.11.23 =========== Jdk60.JDK60-COM Jdk60.JDK60-PA20 Jdk60.JDK60-PA20W Jre60.JRE60-COM Jre60.JRE60-COM-DOC Jre60.JRE60-PA20 Jre60.JRE60-PA20-HS Jre60.JRE60-PA20W Jre60.JRE60-PA20W-HS Jdk60.JDK60-IPF32 Jdk60.JDK60-IPF64 Jre60.JRE60-COM Jre60.JRE60-IPF32 Jre60.JRE60-IPF32-HS Jre60.JRE60-IPF64 Jre60.JRE60-IPF64-HS action: install revision 1.6.0.18.00 or subsequent
HP-UX B.11.23 HP-UX B.11.31 =========== Jdk60.JDK60-COM Jdk60.JDK60-IPF32 Jdk60.JDK60-IPF64 Jre60.JRE60-IPF32 Jre60.JRE60-IPF32-HS Jre60.JRE60-IPF64 Jre60.JRE60-IPF64-HS Jre60.JRE60-COM Jre60.JRE60-IPF32 Jre60.JRE60-IPF32-HS Jre60.JRE60-IPF64 Jre60.JRE60-IPF64-HS
action: install revision 1.6.0.18.00 or subsequent
END AFFECTED VERSIONS
HISTORY Version:1 (rev.1) - 3 April 2013 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2013 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201302-0236", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cosminexus application server standard", "scope": "eq", "trust": 1.5, "vendor": "hitachi", "version": "06-00" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.6.0" }, { "model": "jdk", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "1.6.0" }, { "model": "jdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.6.0" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "1.7.0" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "1.6.0" }, { "model": "jdk", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "1.7.0" }, { "model": "jre 1.6.0 03", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 17", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.7.0 8", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 30", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 18", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 35", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 22", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "09-00" }, { "model": "jdk 1.6.0 28", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk 1.6.0 21", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 20", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.6.0 32", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 38", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 25", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.6.0 35", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 18", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 27", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 19", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.7.0 10", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 03", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 17", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.7.0 2", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk 1.7.0 8", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.7.0 2", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 14", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk 1.7.0 10", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk 1.6.0 25", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 37", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 27", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.7.0 11", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 15", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 30", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "ucosminexus application server light", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "09-00" }, { "model": "jre 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.7.0 7", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.7" }, { "model": "jre 1.6.0 02", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.6.0 23", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 01", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.7.0 4", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.7.0 9", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.6.0 19", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.7.0 9", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 38", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 15", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk 1.7.0 11", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "09-00" }, { "model": "jre 1.6.0 28", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 23", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 11", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "ucosminexus application server express", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "09-00" }, { "model": "jre 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk 1.7.0 7", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 32", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 02", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.7.0 4", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 26", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 26", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 21", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.6.0 24", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "cosminexus application server standard )", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "06-00" }, { "model": "jdk 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.7" }, { "model": "jdk 1.6.0 22", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 24", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-00" }, { "model": "jdk 01-b06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.6" }, { "model": "ucosminexus application server standard )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-00" }, { "model": "ucosminexus application server enterprise )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-00" }, { "model": "ucosminexus application server express )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-00" }, { "model": "jre 1.6.0 2", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 01", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "jre 1.6.0 20", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "linux enterprise software development kit sp2", "scope": "eq", "trust": 0.6, "vendor": "suse", "version": "11" }, { "model": "java se sr13", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.1" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-60" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6)5.5" }, { "model": "trio tview software", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "3.27.0" }, { "model": "nonstop server h06.16.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "tivoli netcool/omnibus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.1" }, { "model": "nonstop server h06.19.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.3" }, { "model": "ucosminexus application server express (solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-20(x6)" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "jdk 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6" }, { "model": "maximo asset management essentials", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "nonstop server j06.08.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.15.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "trio tview software", "scope": "ne", "trust": 0.3, "vendor": "schneider electric", "version": "3.29.0" }, { "model": "nonstop server j06.06.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server j06.14", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "java se sr2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "java sdk sr4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.1" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "tivoli netcool/omnibus fix pack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.3.16" }, { "model": "lotus notes fix pack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "8.5.35" }, { "model": "nonstop server j06.09.03", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.26", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus application server light )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-50" }, { "model": "nonstop server j06.04.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "lotus domino fix pack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "8.5.35" }, { "model": "aura system platform sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.2.6" }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5)5.5" }, { "model": "service manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.11" }, { "model": "java se sr5", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.0.1" }, { "model": "nonstop server j06.13", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.10" }, { "model": "linux enterprise server sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1" }, { "model": "tivoli endpoint manager for remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "nonstop server j06.09.04", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux enterprise server sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.5" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.10" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.2" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.0.3" }, { "model": "nonstop server h06.18.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "java sdk sr3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.1" }, { "model": "nonstop server j06.15.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.22.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "websphere cast iron cloud integration physical applian", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.2.1" }, { "model": "tivoli netcool/omnibus fix pack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.311" }, { "model": "nonstop server j06.12.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "java se sr4", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "tivoli system automation for integrated operations management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "nonstop server j06.05.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server j06.08.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server j06.09.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "maximo asset management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "websphere message broker", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.11" }, { "model": "nonstop server j06.16", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "java sdk sr3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "websphere operational decision management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.0" }, { "model": "ucosminexus client for plug-in", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "nonstop server j6.0.14.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "rational host on-demand", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.0.7" }, { "model": "ucosminexus application server light", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "freeflow print server 73.c0.41", "scope": null, "trust": 0.3, "vendor": "xerox", "version": null }, { "model": "tivoli netcool/omnibus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.1" }, { "model": "enterprise linux desktop supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "conferencing standard edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "010" }, { "model": "enterprise linux supplementary server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.1" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "linux enterprise server sp3 ltss", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "websphere cast iron cloud integration live saas offeri", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.2.2" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "ucosminexus service platform messaging", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-0" }, { "model": "java sdk sr13", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "56009.7" }, { "model": "java sdk sr1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "interactive service manager web tier", "scope": "eq", "trust": 0.3, "vendor": "mercury", "version": "9.30" }, { "model": "java sdk sr4", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.2.4" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10" }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "nonstop server j06.07.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "java sdk sr5", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.0.1" }, { "model": "nonstop server j06.09.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server j06.10.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "service manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.31" }, { "model": "nonstop server j06.06.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus application server standard )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-50" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.2.3" }, { "model": "aura communication manager utility services sp", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.16.1.0.9.8" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00" }, { "model": "nonstop server h06.24.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura system platform", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.4" }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.2" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-10" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00" }, { "model": "ucosminexus application server standard-r", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-70" }, { "model": "ucosminexus application server express )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-50" }, { "model": "nonstop server h06.25", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.4.0.15" }, { "model": "websphere ilog jrules", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "ucosminexus application server light", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "nonstop server h06.15.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus application server light )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00" }, { "model": "conferencing standard edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "ucosminexus application server standard )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-20" }, { "model": "java se sr11", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "12.2" }, { "model": "interactive service manager web tier", "scope": "eq", "trust": 0.3, "vendor": "mercury", "version": "7.11" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.2" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "cosminexus server standard edition", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-04-00" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "tivoli remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.2" }, { "model": "websphere cast iron cloud integration virtual applianc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "nonstop server j06.07.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux enterprise server for vmware sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.5.0.15" }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.1" }, { "model": "nonstop server j06.08.04", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server j06.08.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux enterprise server sp1 for vmware lt", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "java se sr1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "ucosminexus application server enterprise )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-20" }, { "model": "java sdk sr12", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "nonstop server h06.24", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.15.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "tivoli netcool/omnibus fix pack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.2.113" }, { "model": "ucosminexus application server enterprise )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-50" }, { "model": "nonstop server h06.16.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8" }, { "model": "nonstop server h06.18.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.20.03", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "ucosminexus service platform hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00" }, { "model": "freeflow print server 73.c5.11", "scope": null, "trust": 0.3, "vendor": "xerox", "version": null }, { "model": "enterprise linux server supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.8.3" }, { "model": "tivoli endpoint manager for remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.2.3" }, { "model": "nonstop server j06.13.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "tivoli system automation for integrated operations management", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.1.1.4" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.9.3" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.2.3" }, { "model": "nonstop server h06.19.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "java sdk sr2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.2" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.2.5" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1x8664" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-53" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.3" }, { "model": "enterprise linux workstation supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "servicecenter web tier", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2.8" }, { "model": "nonstop server h06.22.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "tivoli netcool/omnibus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00" }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "java se sr4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.1" }, { "model": "ucosminexus application server light (windows", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00(x64)" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.2.2" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.2.1" }, { "model": "nonstop server h06.19.03", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "cosminexus studio", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "5" }, { "model": "interactive service manager web tier", "scope": "eq", "trust": 0.3, "vendor": "mercury", "version": "9.31" }, { "model": "websphere message broker", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.5" }, { "model": "ucosminexus developer professional for plug-in", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-70" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1" }, { "model": "cosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-00" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "maximo asset management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "ucosminexus application server smart edition", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-70" }, { "model": "cosminexus studio web edition", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-04-00" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.2" }, { "model": "maximo asset management essentials", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "nonstop server j06.11.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "nonstop server j06.15", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "aura experience portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "nonstop server h06.21.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "nonstop server h06.20.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "tivoli netcool/omnibus fix pack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.41" }, { "model": "websphere operational decision management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "cosminexus primary server base", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0" }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.2.1" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.4" }, { "model": "nonstop server j06.05.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server j06.07.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus application server express (solaris(sparc", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00" }, { "model": "nonstop server h06.21.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "java sdk sr10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "nonstop server h06.19.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.4" }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.2.2" }, { "model": "conferencing standard edition sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "nonstop server j06.11.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.26.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux enterprise server sp1 ltss", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "5" }, { "model": "linux enterprise java sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.2" }, { "model": "ucosminexus application server express", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10" }, { "model": "nonstop server j06.04.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "websphere cast iron cloud integration studio", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "aura conferencing sp1 standard", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.3" }, { "model": "nonstop server j06.04.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server j06.06.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus primary server base", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10" }, { "model": "nonstop server h06.21.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1.0.9" }, { "model": "java se sr3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "nonstop server j06.06.03", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.2.4" }, { "model": "nonstop server h06.17.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "ucosminexus service platform aix", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00(64)" }, { "model": "aura experience portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "cosminexus studio standard edition", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-04-00" }, { "model": "aura system platform sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "jdk 1.6.0 01-b06", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "nonstop server h06.20.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura system platform sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "6" }, { "model": "conferencing standard edition", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "nonstop server j06.10.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "cosminexus developer light", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-00" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "websphere message broker", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "nonstop server h06.17.03", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "enterprise linux hpc node supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux desktop supplementary client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "ucosminexus service platform windows", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00(x64)" }, { "model": "maximo asset management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "nonstop server h06.16.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.0.9.8" }, { "model": "cosminexus server web edition", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-04-00" }, { "model": "ucosminexus service platform linux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00(x64)" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "nonstop server j06.05.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "linux enterprise java sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-09" }, { "model": "rational host on-demand", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.0" }, { "model": "java se sr12", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "nonstop server h06.20.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "service manager p2", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "9.31.2004" }, { "model": "java sdk sr11", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "linux enterprise desktop sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.11" }, { "model": "nonstop server j06.09.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "ucosminexus application server enterprise (solaris(sparc", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00" }, { "model": "tivoli netcool/omnibus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "nonstop server h06.17.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server j06.08.03", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura conferencing standard", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "nonstop server j06.10.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.25.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.18.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6" }, { "model": "nonstop server h06.27", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6" }, { "model": "nonstop server h06.17.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "service manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.30" }, { "model": "nonstop server j06.14.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#858729" }, { "db": "BID", "id": "57729" }, { "db": "NVD", "id": "CVE-2013-0435" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "120166" }, { "db": "PACKETSTORM", "id": "123734" }, { "db": "PACKETSTORM", "id": "120165" }, { "db": "PACKETSTORM", "id": "120030" } ], "trust": 0.4 }, "cve": "CVE-2013-0435", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2013-0435", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-0435", "trust": 1.0, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2013-0435", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2013-0435" }, { "db": "NVD", "id": "CVE-2013-0435" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\". \nThe vulnerability can be exploited over multiple protocols. \nNote: This issue was previously discussed in BID 57670 (Oracle Java Runtime Environment Multiple Security Vulnerabilities) but has been given its own record to better document it. \nThis vulnerability affects the following supported versions:\n7 Update 11, 6 Update 38. ----------------------------------------------------------------------\n\n\nGet a tax break on purchases of Secunia Solutions!\n\nIf you are a U.S. company, you may be qualified for a tax break for your software purchases. Learn more at:\nhttp://secunia.com/products/corporate/vim/section_179/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nHitachi Cosminexus Products Java Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA43627\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/43627/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43627\n\nRELEASE DATE:\n2011-03-08\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/43627/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/43627/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43627\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nHitachi has acknowledged some vulnerabilities in Hitachi Cosminexus\nproducts, which can be exploited by malicious people to disclose\npotentially sensitive information, manipulate certain data, cause a\nDoS (Denial of Service), and compromise a vulnerable system. \n\nThe vulnerabilities are caused due to vulnerabilities in the bundled\nversion of Cosminexus Developer\u0027s Kit for Java. \n\nFor more information:\nSA43262\n\nPlease see the vendor\u0027s advisory for a full list of affected\nproducts. Please see vendor advisory for more\ndetails. \n\nORIGINAL ADVISORY:\nHitachi (English):\nhttp://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html\n\nHitachi (Japanese):\nhttp://www.hitachi.co.jp/Prod/comp/soft1/security/info/./vuls/HS11-003/index.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2013-02-19-1 Java for OS X 2013-001 and Mac OS X v10.6\nUpdate 13\n\nJava for OS X 2013-001 and Mac OS X v10.6 Update 13 is now available\nand addresses the following:\n\nJava\nAvailable for: OS X Lion v10.7 or later,\nOS X Lion Server v10.7 or later, OS X Mountain Lion 10.8 or later\nImpact: Multiple vulnerabilities in Java 1.6.0_37\nDescription: Multiple vulnerabilities existed in Java 1.6.0_37, the\nmost serious of which may allow an untrusted Java applet to execute\narbitrary code outside the Java sandbox. For\nMac OS X v10.6 systems, these issues were addressed in Java for Mac\nOS X v10.6 Update 13. Further information is available via the Java\nwebsite at http://www.oracle.com/technetwork/java/javase/\nreleasenotes-136954.html\nCVE-ID\nCVE-2012-3213\nCVE-2012-3342\nCVE-2013-0351\nCVE-2013-0409\nCVE-2013-0419\nCVE-2013-0423\nCVE-2013-0424\nCVE-2013-0425\nCVE-2013-0426\nCVE-2013-0427\nCVE-2013-0428\nCVE-2013-0429\nCVE-2013-0432\nCVE-2013-0433\nCVE-2013-0434\nCVE-2013-0435\nCVE-2013-0438\nCVE-2013-0440\nCVE-2013-0441\nCVE-2013-0442\nCVE-2013-0443\nCVE-2013-0445\nCVE-2013-0446\nCVE-2013-0450\nCVE-2013-1473\nCVE-2013-1475\nCVE-2013-1476\nCVE-2013-1478\nCVE-2013-1480\nCVE-2013-1481\n\nJava\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 or later, OS X Lion Server v10.7 or later,\nOS X Mountain Lion 10.8 or later\nImpact: Multiple vulnerabilities in Java\nDescription: Multiple vulnerabilities existed in Java, the most\nserious of which may allow an untrusted Java applet to execute\narbitrary code outside the Java sandbox. \nFurther information is available via the Java website at http://www.o\nracle.com/technetwork/java/javase/releasenotes-136954.html\nCVE-ID\nCVE-2013-1486\nCVE-2013-1487\nCVE-2013-1488\n\nMalware removal\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 or later, OS X Lion Server v10.7 or later,\nOS X Mountain Lion 10.8 or later\nDescription: This update runs a malware removal tool that will\nremove the most common variants of malware. If malware is found, it\npresents a dialog notifying the user that malware was removed. There\nis no indication to the user if malware is not found. \n\n\nJava for OS X 2013-001 and Java for Mac OS X 10.6 Update 13\nmay be obtained from the Software Update pane in System Preferences,\nMac App Store, or Apple\u0027s Software Downloads web site:\nhttp://www.apple.com/support/downloads/\n\nFor Mac OS X v10.6 systems\nThe download file is named: JavaForMacOSX10.6.Update13.dmg\nIts SHA-1 digest is: 5327984bc0b300c237fe69cecf69513624f56b0e\n\nFor OS X Lion and Mountain Lion systems\nThe download file is named: JavaForOSX2013-001.dmg\nIts SHA-1 digest is: 145d74354241cf2f567d2768bbd0a7185e7d308a\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG/MacGPG2 v2.0.17 (Darwin)\nComment: GPGTools - http://gpgtools.org\n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\nrmbzMJjZUnlCDXoLEVQ9\n=qlVo\n-----END PGP SIGNATURE-----\n. In a typical operating environment, these are of low security risk as\nthe runtime is not used on untrusted applets. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201406-32\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: IcedTea JDK: Multiple vulnerabilities\n Date: June 29, 2014\n Bugs: #312297, #330205, #340819, #346799, #352035, #353418,\n #354231, #355127, #370787, #387637, #404095, #421031,\n #429522, #433389, #438750, #442478, #457206, #458410,\n #461714, #466822, #477210, #489570, #508270\n ID: 201406-32\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in the IcedTea JDK, the worst\nof which could lead to arbitrary code execution. \n\nBackground\n==========\n\nIcedTea is a distribution of the Java OpenJDK source code built with\nfree build tools. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 dev-java/icedtea-bin \u003c 6.1.13.3 \u003e= 6.1.13.3 \n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in the IcedTea JDK. \nPlease review the CVE identifiers referenced below for details. \n\nImpact\n======\n\nA remote attacker could possibly execute arbitrary code with the\nprivileges of the process, cause a Denial of Service condition, obtain\nsensitive information, bypass intended security policies, or have other\nunspecified impact. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll IcedTea JDK users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-java/icedtea-bin-6.1.13.3\"\n\nReferences\n==========\n\n[ 1 ] CVE-2009-3555\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555\n[ 2 ] CVE-2010-2548\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2548\n[ 3 ] CVE-2010-2783\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2783\n[ 4 ] CVE-2010-3541\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3541\n[ 5 ] CVE-2010-3548\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3548\n[ 6 ] CVE-2010-3549\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3549\n[ 7 ] CVE-2010-3551\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3551\n[ 8 ] CVE-2010-3553\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3553\n[ 9 ] CVE-2010-3554\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3554\n[ 10 ] CVE-2010-3557\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3557\n[ 11 ] CVE-2010-3561\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3561\n[ 12 ] CVE-2010-3562\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3562\n[ 13 ] CVE-2010-3564\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3564\n[ 14 ] CVE-2010-3565\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3565\n[ 15 ] CVE-2010-3566\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3566\n[ 16 ] CVE-2010-3567\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3567\n[ 17 ] CVE-2010-3568\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3568\n[ 18 ] CVE-2010-3569\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3569\n[ 19 ] CVE-2010-3573\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3573\n[ 20 ] CVE-2010-3574\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3574\n[ 21 ] CVE-2010-3860\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3860\n[ 22 ] CVE-2010-4351\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4351\n[ 23 ] CVE-2010-4448\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4448\n[ 24 ] CVE-2010-4450\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4450\n[ 25 ] CVE-2010-4465\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4465\n[ 26 ] CVE-2010-4467\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4467\n[ 27 ] CVE-2010-4469\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4469\n[ 28 ] CVE-2010-4470\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4470\n[ 29 ] CVE-2010-4471\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4471\n[ 30 ] CVE-2010-4472\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4472\n[ 31 ] CVE-2010-4476\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4476\n[ 32 ] CVE-2011-0025\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0025\n[ 33 ] CVE-2011-0706\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0706\n[ 34 ] CVE-2011-0815\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0815\n[ 35 ] CVE-2011-0822\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0822\n[ 36 ] CVE-2011-0862\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0862\n[ 37 ] CVE-2011-0864\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0864\n[ 38 ] CVE-2011-0865\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0865\n[ 39 ] CVE-2011-0868\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0868\n[ 40 ] CVE-2011-0869\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0869\n[ 41 ] CVE-2011-0870\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0870\n[ 42 ] CVE-2011-0871\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0871\n[ 43 ] CVE-2011-0872\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0872\n[ 44 ] CVE-2011-3389\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389\n[ 45 ] CVE-2011-3521\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3521\n[ 46 ] CVE-2011-3544\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3544\n[ 47 ] CVE-2011-3547\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3547\n[ 48 ] CVE-2011-3548\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3548\n[ 49 ] CVE-2011-3551\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3551\n[ 50 ] CVE-2011-3552\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3552\n[ 51 ] CVE-2011-3553\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3553\n[ 52 ] CVE-2011-3554\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3554\n[ 53 ] CVE-2011-3556\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3556\n[ 54 ] CVE-2011-3557\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3557\n[ 55 ] CVE-2011-3558\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3558\n[ 56 ] CVE-2011-3560\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3560\n[ 57 ] CVE-2011-3563\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3563\n[ 58 ] CVE-2011-3571\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3571\n[ 59 ] CVE-2011-5035\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5035\n[ 60 ] CVE-2012-0497\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0497\n[ 61 ] CVE-2012-0501\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0501\n[ 62 ] CVE-2012-0502\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0502\n[ 63 ] CVE-2012-0503\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0503\n[ 64 ] CVE-2012-0505\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0505\n[ 65 ] CVE-2012-0506\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0506\n[ 66 ] CVE-2012-0547\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0547\n[ 67 ] CVE-2012-1711\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1711\n[ 68 ] CVE-2012-1713\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1713\n[ 69 ] CVE-2012-1716\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1716\n[ 70 ] CVE-2012-1717\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1717\n[ 71 ] CVE-2012-1718\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1718\n[ 72 ] CVE-2012-1719\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1719\n[ 73 ] CVE-2012-1723\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1723\n[ 74 ] CVE-2012-1724\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1724\n[ 75 ] CVE-2012-1725\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1725\n[ 76 ] CVE-2012-1726\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1726\n[ 77 ] CVE-2012-3216\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3216\n[ 78 ] CVE-2012-3422\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3422\n[ 79 ] CVE-2012-3423\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3423\n[ 80 ] CVE-2012-4416\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4416\n[ 81 ] CVE-2012-4540\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4540\n[ 82 ] CVE-2012-5068\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5068\n[ 83 ] CVE-2012-5069\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5069\n[ 84 ] CVE-2012-5070\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5070\n[ 85 ] CVE-2012-5071\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5071\n[ 86 ] CVE-2012-5072\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5072\n[ 87 ] CVE-2012-5073\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5073\n[ 88 ] CVE-2012-5074\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5074\n[ 89 ] CVE-2012-5075\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5075\n[ 90 ] CVE-2012-5076\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5076\n[ 91 ] CVE-2012-5077\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5077\n[ 92 ] CVE-2012-5081\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5081\n[ 93 ] CVE-2012-5084\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5084\n[ 94 ] CVE-2012-5085\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5085\n[ 95 ] CVE-2012-5086\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5086\n[ 96 ] CVE-2012-5087\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5087\n[ 97 ] CVE-2012-5089\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5089\n[ 98 ] CVE-2012-5979\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5979\n[ 99 ] CVE-2013-0169\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169\n[ 100 ] CVE-2013-0401\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0401\n[ 101 ] CVE-2013-0424\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0424\n[ 102 ] CVE-2013-0425\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0425\n[ 103 ] CVE-2013-0426\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0426\n[ 104 ] CVE-2013-0427\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0427\n[ 105 ] CVE-2013-0428\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0428\n[ 106 ] CVE-2013-0429\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0429\n[ 107 ] CVE-2013-0431\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0431\n[ 108 ] CVE-2013-0432\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0432\n[ 109 ] CVE-2013-0433\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0433\n[ 110 ] CVE-2013-0434\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0434\n[ 111 ] CVE-2013-0435\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0435\n[ 112 ] CVE-2013-0440\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0440\n[ 113 ] CVE-2013-0441\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0441\n[ 114 ] CVE-2013-0442\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0442\n[ 115 ] CVE-2013-0443\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0443\n[ 116 ] CVE-2013-0444\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0444\n[ 117 ] CVE-2013-0450\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0450\n[ 118 ] CVE-2013-0809\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0809\n[ 119 ] CVE-2013-1475\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1475\n[ 120 ] CVE-2013-1476\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1476\n[ 121 ] CVE-2013-1478\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1478\n[ 122 ] CVE-2013-1480\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1480\n[ 123 ] CVE-2013-1484\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1484\n[ 124 ] CVE-2013-1485\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1485\n[ 125 ] CVE-2013-1486\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1486\n[ 126 ] CVE-2013-1488\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1488\n[ 127 ] CVE-2013-1493\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1493\n[ 128 ] CVE-2013-1500\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1500\n[ 129 ] CVE-2013-1518\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1518\n[ 130 ] CVE-2013-1537\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1537\n[ 131 ] CVE-2013-1557\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1557\n[ 132 ] CVE-2013-1569\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1569\n[ 133 ] CVE-2013-1571\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1571\n[ 134 ] CVE-2013-2383\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2383\n[ 135 ] CVE-2013-2384\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2384\n[ 136 ] CVE-2013-2407\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2407\n[ 137 ] CVE-2013-2412\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2412\n[ 138 ] CVE-2013-2415\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2415\n[ 139 ] CVE-2013-2417\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2417\n[ 140 ] CVE-2013-2419\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2419\n[ 141 ] CVE-2013-2420\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2420\n[ 142 ] CVE-2013-2421\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2421\n[ 143 ] CVE-2013-2422\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2422\n[ 144 ] CVE-2013-2423\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2423\n[ 145 ] CVE-2013-2424\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2424\n[ 146 ] CVE-2013-2426\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2426\n[ 147 ] CVE-2013-2429\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2429\n[ 148 ] CVE-2013-2430\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2430\n[ 149 ] CVE-2013-2431\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2431\n[ 150 ] CVE-2013-2436\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2436\n[ 151 ] CVE-2013-2443\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2443\n[ 152 ] CVE-2013-2444\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2444\n[ 153 ] CVE-2013-2445\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2445\n[ 154 ] CVE-2013-2446\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2446\n[ 155 ] CVE-2013-2447\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2447\n[ 156 ] CVE-2013-2448\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2448\n[ 157 ] CVE-2013-2449\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2449\n[ 158 ] CVE-2013-2450\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2450\n[ 159 ] CVE-2013-2451\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2451\n[ 160 ] CVE-2013-2452\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2452\n[ 161 ] CVE-2013-2453\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2453\n[ 162 ] CVE-2013-2454\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2454\n[ 163 ] CVE-2013-2455\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2455\n[ 164 ] CVE-2013-2456\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2456\n[ 165 ] CVE-2013-2457\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2457\n[ 166 ] CVE-2013-2458\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2458\n[ 167 ] CVE-2013-2459\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2459\n[ 168 ] CVE-2013-2460\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2460\n[ 169 ] CVE-2013-2461\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2461\n[ 170 ] CVE-2013-2463\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2463\n[ 171 ] CVE-2013-2465\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2465\n[ 172 ] CVE-2013-2469\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2469\n[ 173 ] CVE-2013-2470\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2470\n[ 174 ] CVE-2013-2471\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2471\n[ 175 ] CVE-2013-2472\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2472\n[ 176 ] CVE-2013-2473\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2473\n[ 177 ] CVE-2013-3829\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3829\n[ 178 ] CVE-2013-4002\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4002\n[ 179 ] CVE-2013-5772\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5772\n[ 180 ] CVE-2013-5774\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5774\n[ 181 ] CVE-2013-5778\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5778\n[ 182 ] CVE-2013-5780\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5780\n[ 183 ] CVE-2013-5782\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5782\n[ 184 ] CVE-2013-5783\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5783\n[ 185 ] CVE-2013-5784\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5784\n[ 186 ] CVE-2013-5790\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5790\n[ 187 ] CVE-2013-5797\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5797\n[ 188 ] CVE-2013-5800\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5800\n[ 189 ] CVE-2013-5802\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5802\n[ 190 ] CVE-2013-5803\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5803\n[ 191 ] CVE-2013-5804\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5804\n[ 192 ] CVE-2013-5805\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5805\n[ 193 ] CVE-2013-5806\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5806\n[ 194 ] CVE-2013-5809\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5809\n[ 195 ] CVE-2013-5814\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5814\n[ 196 ] CVE-2013-5817\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5817\n[ 197 ] CVE-2013-5820\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5820\n[ 198 ] CVE-2013-5823\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5823\n[ 199 ] CVE-2013-5825\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5825\n[ 200 ] CVE-2013-5829\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5829\n[ 201 ] CVE-2013-5830\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5830\n[ 202 ] CVE-2013-5840\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5840\n[ 203 ] CVE-2013-5842\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5842\n[ 204 ] CVE-2013-5849\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5849\n[ 205 ] CVE-2013-5850\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5850\n[ 206 ] CVE-2013-5851\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5851\n[ 207 ] CVE-2013-6629\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6629\n[ 208 ] CVE-2013-6954\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6954\n[ 209 ] CVE-2014-0429\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0429\n[ 210 ] CVE-2014-0446\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0446\n[ 211 ] CVE-2014-0451\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0451\n[ 212 ] CVE-2014-0452\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0452\n[ 213 ] CVE-2014-0453\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0453\n[ 214 ] CVE-2014-0456\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0456\n[ 215 ] CVE-2014-0457\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0457\n[ 216 ] CVE-2014-0458\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0458\n[ 217 ] CVE-2014-0459\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459\n[ 218 ] CVE-2014-0460\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0460\n[ 219 ] CVE-2014-0461\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0461\n[ 220 ] CVE-2014-1876\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1876\n[ 221 ] CVE-2014-2397\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2397\n[ 222 ] CVE-2014-2398\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2398\n[ 223 ] CVE-2014-2403\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2403\n[ 224 ] CVE-2014-2412\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2412\n[ 225 ] CVE-2014-2414\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2414\n[ 226 ] CVE-2014-2421\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2421\n[ 227 ] CVE-2014-2423\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2423\n[ 228 ] CVE-2014-2427\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2427\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201406-32.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2014 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. \nDownload and install the updates from The HP Software Support Online (SSO). -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Critical: java-1.6.0-openjdk security update\nAdvisory ID: RHSA-2013:0245-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2013-0245.html\nIssue date: 2013-02-08\nCVE Names: CVE-2013-0424 CVE-2013-0425 CVE-2013-0426 \n CVE-2013-0427 CVE-2013-0428 CVE-2013-0429 \n CVE-2013-0432 CVE-2013-0433 CVE-2013-0434 \n CVE-2013-0435 CVE-2013-0440 CVE-2013-0441 \n CVE-2013-0442 CVE-2013-0443 CVE-2013-0445 \n CVE-2013-0450 CVE-2013-1475 CVE-2013-1476 \n CVE-2013-1478 CVE-2013-1480 \n=====================================================================\n\n1. Summary:\n\nUpdated java-1.6.0-openjdk packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 6. \n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nThese packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit. \n\nMultiple improper permission check issues were discovered in the AWT,\nCORBA, JMX, and Libraries components in OpenJDK. An untrusted Java\napplication or applet could use these flaws to bypass Java sandbox\nrestrictions. (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441, CVE-2013-1475,\nCVE-2013-1476, CVE-2013-0429, CVE-2013-0450, CVE-2013-0425, CVE-2013-0426,\nCVE-2013-0428)\n\nMultiple flaws were found in the way image parsers in the 2D and AWT\ncomponents handled image raster parameters. A specially-crafted image could\ncause Java Virtual Machine memory corruption and, possibly, lead to\narbitrary code execution with the virtual machine privileges. \n(CVE-2013-1478, CVE-2013-1480)\n\nA flaw was found in the AWT component\u0027s clipboard handling code. An\nuntrusted Java application or applet could use this flaw to access\nclipboard data, bypassing Java sandbox restrictions. (CVE-2013-0432)\n\nThe default Java security properties configuration did not restrict access\nto certain com.sun.xml.internal packages. An untrusted Java application or\napplet could use this flaw to access information, bypassing certain Java\nsandbox restrictions. This update lists the whole package as restricted. \n(CVE-2013-0435)\n\nMultiple improper permission check issues were discovered in the Libraries,\nNetworking, and JAXP components. An untrusted Java application or applet\ncould use these flaws to bypass certain Java sandbox restrictions. \n(CVE-2013-0427, CVE-2013-0433, CVE-2013-0434)\n\nIt was discovered that the RMI component\u0027s CGIHandler class used user\ninputs in error messages without any sanitization. An attacker could use\nthis flaw to perform a cross-site scripting (XSS) attack. (CVE-2013-0424)\n\nIt was discovered that the SSL/TLS implementation in the JSSE component\ndid not properly enforce handshake message ordering, allowing an unlimited\nnumber of handshake restarts. A remote attacker could use this flaw to\nmake an SSL/TLS server using JSSE consume an excessive amount of CPU by\ncontinuously restarting the handshake. (CVE-2013-0440)\n\nIt was discovered that the JSSE component did not properly validate\nDiffie-Hellman public keys. An SSL/TLS client could possibly use this flaw\nto perform a small subgroup attack. (CVE-2013-0443)\n\nNote: If the web browser plug-in provided by the icedtea-web package was\ninstalled, the issues exposed via Java applets could have been exploited\nwithout user interaction if a user visited a malicious website. \n\nThis erratum also upgrades the OpenJDK package to IcedTea6 1.11.6. Refer to\nthe NEWS file, linked to in the References, for further information. \n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n859140 - CVE-2013-0440 OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)\n860652 - CVE-2013-1475 OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50)\n906813 - CVE-2013-0424 OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)\n906892 - CVE-2013-0435 OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)\n906894 - CVE-2013-1478 OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)\n906899 - CVE-2013-0442 OpenJDK: insufficient privilege checking issue (AWT, 7192977)\n906900 - CVE-2013-0445 OpenJDK: insufficient privilege checking issue (AWT, 8001057)\n906904 - CVE-2013-1480 OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)\n906911 - CVE-2013-0450 OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)\n907207 - CVE-2013-0428 OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)\n907219 - CVE-2013-0432 OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)\n907340 - CVE-2013-0443 OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)\n907344 - CVE-2013-0425 OpenJDK: logging insufficient access control checks (Libraries, 6664509)\n907346 - CVE-2013-0426 OpenJDK: logging insufficient access control checks (Libraries, 6664528)\n907453 - CVE-2013-0434 OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)\n907455 - CVE-2013-0427 OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)\n907456 - CVE-2013-0433 OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)\n907457 - CVE-2013-1476 OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)\n907458 - CVE-2013-0441 OpenJDK: missing serialization restriction (CORBA, 7201066)\n907460 - CVE-2013-0429 OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694)\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.src.rpm\n\ni386:\njava-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.src.rpm\n\ni386:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.src.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.src.rpm\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.src.rpm\n\ni386:\njava-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.src.rpm\n\ni386:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.src.rpm\n\ni386:\njava-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.src.rpm\n\ni386:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2013-0424.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-0425.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-0426.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-0427.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-0428.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-0429.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-0432.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-0433.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-0434.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-0435.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-0440.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-0441.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-0442.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-0443.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-0445.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-0450.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-1475.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-1476.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-1478.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-1480.html\nhttps://access.redhat.com/security/updates/classification/#critical\nhttp://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2013 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFRFVVkXlSAg2UNWIIRAj6IAJ9pyNWKcES0d/HAkxu8/nazgM+tGgCgsH48\n491W7PbYZVogid5QvYiYwv8=\n=d0CL\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. Further\ninformation about these flaws can be found on the Oracle Java SE Critical\nPatch Update Advisory page, listed in the References section. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c03725347\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c03725347\nVersion: 1\n\nHPSBUX02864 SSRT101156 rev.1 - HP-UX Running Java, Remote Unauthorized\nAccess, Disclosure of Information, and Other Vulnerabilities\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2013-04-03\nLast Updated: 2013-04-03\n\nPotential Security Impact: Remote unauthorized access, disclosure of\ninformation, and other vulnerabilities\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified in Java Runtime\nEnvironment (JRE) and Java Developer Kit (JDK) running on HP-UX. These\nvulnerabilities could allow remote unauthorized access, disclosure of\ninformation, and other exploits. \nHP-UX B.11.11, B.11.23, and B.11.31 running HP JDK and JRE v6.0.17 and\nearlier\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2012-1541 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2012-3213 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2012-3342 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2013-0351 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2013-0409 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0\nCVE-2013-0419 (AV:N/AC:H/Au:N/C:C/I:C/A:C) 7.6\nCVE-2013-0423 (AV:N/AC:H/Au:N/C:C/I:C/A:C) 7.6\nCVE-2013-0424 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0\nCVE-2013-0425 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2013-0426 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2013-0427 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0\nCVE-2013-0428 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2013-0429 (AV:N/AC:H/Au:N/C:C/I:C/A:C) 7.6\nCVE-2013-0432 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4\nCVE-2013-0433 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0\nCVE-2013-0434 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0\nCVE-2013-0435 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0\nCVE-2013-0438 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\nCVE-2013-0440 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2013-0441 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2013-0442 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2013-0443 (AV:N/AC:H/Au:N/C:P/I:P/A:N) 4.0\nCVE-2013-0445 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2013-0446 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2013-0450 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2013-0809 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2013-1473 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0\nCVE-2013-1475 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2013-1476 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2013-1478 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2013-1480 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2013-1481 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2013-1493 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following Java version upgrade to resolve these\nvulnerabilities. \nThe upgrade is available from the following location\n\nhttp://www.hp.com/java\n\nOS Version\n Release Version\n\nHP-UX B.11.11, B.11.23, B.11.31\n JDK and JRE v6.0.18 or subsequent\n\nMANUAL ACTIONS: Yes - Update\nFor Java v6.0 update to Java v6.0.18 or subsequent\n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see https://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS\n\nHP-UX B.11.11\nHP-UX B.11.23\n===========\nJdk60.JDK60-COM\nJdk60.JDK60-PA20\nJdk60.JDK60-PA20W\nJre60.JRE60-COM\nJre60.JRE60-COM-DOC\nJre60.JRE60-PA20\nJre60.JRE60-PA20-HS\nJre60.JRE60-PA20W\nJre60.JRE60-PA20W-HS\nJdk60.JDK60-IPF32\nJdk60.JDK60-IPF64\nJre60.JRE60-COM\nJre60.JRE60-IPF32\nJre60.JRE60-IPF32-HS\nJre60.JRE60-IPF64\nJre60.JRE60-IPF64-HS\naction: install revision 1.6.0.18.00 or subsequent\n\nHP-UX B.11.23\nHP-UX B.11.31\n===========\nJdk60.JDK60-COM\nJdk60.JDK60-IPF32\nJdk60.JDK60-IPF64\nJre60.JRE60-IPF32\nJre60.JRE60-IPF32-HS\nJre60.JRE60-IPF64\nJre60.JRE60-IPF64-HS\nJre60.JRE60-COM\nJre60.JRE60-IPF32\nJre60.JRE60-IPF32-HS\nJre60.JRE60-IPF64\nJre60.JRE60-IPF64-HS\n\naction: install revision 1.6.0.18.00 or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 3 April 2013 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin List: A list of HP Security Bulletins, updated\nperiodically, is contained in HP Security Notice HPSN-2011-001:\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c02964430\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttp://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2013 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits;damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners", "sources": [ { "db": "NVD", "id": "CVE-2013-0435" }, { "db": "CERT/CC", "id": "VU#858729" }, { "db": "BID", "id": "57729" }, { "db": "VULMON", "id": "CVE-2013-0435" }, { "db": "PACKETSTORM", "id": "120166" }, { "db": "PACKETSTORM", "id": "99047" }, { "db": "PACKETSTORM", "id": "120419" }, { "db": "PACKETSTORM", "id": "123734" }, { "db": "PACKETSTORM", "id": "127267" }, { "db": "PACKETSTORM", "id": "123874" }, { "db": "PACKETSTORM", "id": "120036" }, { "db": "PACKETSTORM", "id": "121464" }, { "db": "PACKETSTORM", "id": "120165" }, { "db": "PACKETSTORM", "id": "120030" }, { "db": "PACKETSTORM", "id": "121286" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-0435", "trust": 2.4 }, { "db": "CERT/CC", "id": "VU#858729", "trust": 2.2 }, { "db": "BID", "id": "57729", "trust": 1.4 }, { "db": "USCERT", "id": "TA13-032A", "trust": 1.1 }, { "db": "HITACHI", "id": "HS11-003", "trust": 0.4 }, { "db": "ICS CERT", "id": "ICSA-17-213-02", "trust": 0.3 }, { "db": "SECUNIA", "id": "43627", "trust": 0.2 }, { "db": "VULMON", "id": "CVE-2013-0435", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "120166", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "99047", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "120419", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "123734", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "127267", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "123874", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "120036", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "121464", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "120165", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "120030", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "121286", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#858729" }, { "db": "VULMON", "id": "CVE-2013-0435" }, { "db": "BID", "id": "57729" }, { "db": "PACKETSTORM", "id": "120166" }, { "db": "PACKETSTORM", "id": "99047" }, { "db": "PACKETSTORM", "id": "120419" }, { "db": "PACKETSTORM", "id": "123734" }, { "db": "PACKETSTORM", "id": "127267" }, { "db": "PACKETSTORM", "id": "123874" }, { "db": "PACKETSTORM", "id": "120036" }, { "db": "PACKETSTORM", "id": "121464" }, { "db": "PACKETSTORM", "id": "120165" }, { "db": "PACKETSTORM", "id": "120030" }, { "db": "PACKETSTORM", "id": "121286" }, { "db": "NVD", "id": "CVE-2013-0435" } ] }, "id": "VAR-201302-0236", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 1.0 }, "last_update_date": "2024-11-28T21:11:31.571000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Red Hat: Important: java-1.6.0-openjdk security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20130246 - Security Advisory" }, { "title": "Red Hat: Critical: java-1.6.0-openjdk security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20130245 - Security Advisory" }, { "title": "Red Hat: Important: java-1.7.0-openjdk security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20130247 - Security Advisory" }, { "title": "Amazon Linux AMI: ALAS-2013-156", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2013-156" }, { "title": "Red Hat: Critical: java-1.6.0-ibm security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20130625 - Security Advisory" }, { "title": "Amazon Linux AMI: ALAS-2013-155", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2013-155" }, { "title": "Red Hat: Critical: java-1.7.0-ibm security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20130626 - Security Advisory" }, { "title": "Ubuntu Security Notice: openjdk-6, openjdk-7 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1724-1" }, { "title": "Red Hat: Low: Red Hat Network Satellite server IBM Java Runtime security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20131456 - Security Advisory" }, { "title": "Red Hat: Low: Red Hat Network Satellite server IBM Java Runtime security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20131455 - Security Advisory" } ], "sources": [ { "db": "VULMON", "id": "CVE-2013-0435" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2013-0435" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" }, { "trust": 1.5, "url": "http://www.kb.cert.org/vuls/id/858729" }, { "trust": 1.3, "url": "http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/news" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2013-0236.html" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2013-0245.html" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2013-0246.html" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2013-1455.html" }, { "trust": 1.2, "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "trust": 1.2, "url": "http://www.securityfocus.com/bid/57729" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2013-0237.html" }, { "trust": 1.1, "url": "http://www.us-cert.gov/cas/techalerts/ta13-032a.html" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2013-0247.html" }, { "trust": 1.1, "url": "http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/c1fa21042291" }, { "trust": 1.1, "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=906892" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=136439120408139\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=136570436423916\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=136733161405818\u0026w=2" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2013-1456.html" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2013:095" }, { "trust": 1.1, "url": "https://wiki.mageia.org/en/support/advisories/mgasa-2013-0056" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a19520" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a19078" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a16489" }, { "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013verbose-1841196.html" }, { "trust": 0.8, "url": "http://taosecurity.blogspot.com/2012/11/do-devs-care-about-java-insecurity.html?showcomment=1353874245992#c4794680666510382012" }, { "trust": 0.8, "url": "http://codeascraft.etsy.com/2013/03/18/java-not-even-once/" }, { "trust": 0.8, "url": "http://blogs.technet.com/b/srd/archive/2013/05/29/java-when-you-cannot-let-go.aspx" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0429" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0428" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0435" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0434" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0432" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0426" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0440" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0427" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0425" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0424" }, { "trust": 0.6, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21650822" }, { "trust": 0.6, "url": "https://downloads.avaya.com/css/p8/documents/100170924" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0450" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1475" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0442" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0441" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0443" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0445" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3342" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0351" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0409" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0419" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0438" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3213" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0423" }, { "trust": 0.4, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs11-003/index.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2013-0440.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2013-1476.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2013-0427.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2013-0433.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2013-0445.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2013-0432.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2013-0428.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2013-1480.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2013-0425.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2013-0442.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2013-0450.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2013-0424.html" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.4, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1478" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2013-0443.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2013-1478.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2013-0435.html" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2013-0434.html" }, { "trust": 0.4, "url": "http://bugzilla.redhat.com/):" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2013-0441.html" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1476" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2013-0426.html" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0446" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1473" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1541" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21650623" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03748879" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21644918" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/java/index.html" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24033920" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24033922" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24031555" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24034621" }, { "trust": 0.3, "url": "http://www.xerox.com/download/security/security-bulletin/1683f-4d960e4b16bb2/cert_xrx13-004_v1.01.pdf" }, { "trust": 0.3, "url": "http://support.apple.com/kb/ht5666" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-213-02" }, { "trust": 0.3, "url": "http://prod.lists.apple.com/archives/security-announce/2013/feb/msg00000.html" }, { "trust": 0.3, "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03748879" }, { "trust": 0.3, "url": "http://h20566.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?docid=emr_na-c03909126-1" }, { "trust": 0.3, "url": "https://h20565.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?spf_p.tpst=kbdocdisplay\u0026spf_p.prp_kbdocdisplay=wsrp-navigationalstate%3ddocid%253demr_na-c03714148-1%257cdoclocale%253d%" }, { "trust": 0.3, "url": "http://h20566.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?javax.portlet.endcachetok=com.vignette.cachetoken\u0026javax.portlet.prp_ba847bafb2a2d782fcbb0710b053ce01=wsrp-navigationalsta" }, { "trust": 0.3, "url": "http://www.ibm.com/developerworks/java/jdk/alerts/#ibm_security_update_november_2012" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21634069" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21635160" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100170079" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100169783" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21633170" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643544" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21635864" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21643697" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21642358" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21628927" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643618" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643513" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21633669" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2013-1475.html" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2013-0429.html" }, { "trust": 0.3, "url": "https://access.redhat.com/knowledge/articles/11258" }, { "trust": 0.3, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0430" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1480" }, { "trust": 0.2, "url": "http://support.apple.com/kb/ht1222" }, { "trust": 0.2, "url": "http://www.apple.com/support/downloads/" }, { "trust": 0.2, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.2, "url": "http://www.o" }, { "trust": 0.2, "url": "http://gpgtools.org" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2013-0419.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2013-0409.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2013-0423.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2013-0351.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2012-1541.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2012-3213.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2013-0446.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2013-1481.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2013-1473.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2012-3342.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2013-0438.html" }, { "trust": 0.2, "url": "http://support.openview.hp.com/selfsolve/document/fid/documentum_hpsm_00424" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0437" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0169" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0436" }, { "trust": 0.2, "url": "http://support.openview.hp.com/selfsolve/document/fid/documentum_hpsm_00422" }, { "trust": 0.2, "url": "http://support.openview.hp.com/selfsolve/document/fid/documentum_hpsm_00426" }, { "trust": 0.2, "url": "http://support.openview.hp.com/selfsolve/document/fid/documentum_hpsm_00420" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4301" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1543" }, { "trust": 0.2, "url": "http://support.openview.hp.com/selfsolve/document/fid/documentum_hpsm_00421" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4305" }, { "trust": 0.2, "url": "http://support.openview.hp.com/selfsolve/document/fid/documentum_hpsm_00423" }, { "trust": 0.2, "url": "http://support.openview.hp.com/selfsolve/document/fid/documentum_hpsm_00419" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0431" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0439" }, { "trust": 0.2, "url": "http://support.openview.hp.com/selfsolve/document/fid/documentum_hpsm_00425" }, { "trust": 0.2, "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.2, "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2013:0246" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/1724-1/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "http://secunia.com/advisories/43627/#comments" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/evm/" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/vim/section_179/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/43627/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://www.hitachi.co.jp/prod/comp/soft1/security/info/./vuls/hs11-003/index.html" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43627" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://www.oracle.com/technetwork/java/javase/" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2468.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-0873.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3548.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-1540.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2463.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2446.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3521" }, { "trust": 0.1, "url": "https://access.redhat.com/site/articles/11258" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-1500.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3556.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2419.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3563.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3546" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-0401.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2444.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2454.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-5089.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3551.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-1722.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-5079.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-0497.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-0500.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3389.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2422.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3561.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-1721.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-5081.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-5071.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-0863.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-1532.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-3216.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-5069.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-0499.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0862" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-0867.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-5084.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-0507.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2451.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3552.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-0809.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-1487.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-0814.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3547.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-4820.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3549" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-0503.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-1493.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-1569.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-5073.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3554.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-4823.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2435.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2456.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-3743.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3549.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#low" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2407.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3553" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3516.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-0871.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3554" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2470.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-5068.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-0868.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3389" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-4822.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0873" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-3159.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-1557.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-5075.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2471.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2429.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3548" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3521.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3551" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2443.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-1713.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3547" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2457.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2412.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-5072.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3553.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-1718.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-1537.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-1717.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3545" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-1531.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2432.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2447.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-0802.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2452.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-0865.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3516" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3545.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-1491.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2464.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-0862.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-1571.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2383.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2418.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3561" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3556" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-0547.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-1563.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2465.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2472.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2466.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2424.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2453.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3544.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0867" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2473.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2433.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2437.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-1716.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-0506.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-5083.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-0501.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-1533.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0869" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2450.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3560.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3550" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3557.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-3143.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-1725.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0865" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-0502.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2417.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2394.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2455.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-0498.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-1682.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2442.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2459.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2430.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3560" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3546.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-0551.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3552" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3544" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-0869.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2448.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0863" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-1719.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3550.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-1486.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-5035.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3557" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2384.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-0169.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-0505.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2469.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0871" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0868" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0802" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0814" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2420.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2440.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4470" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3574" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3423" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3548" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3565" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2469" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0864" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3553" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2443" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1717" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2412" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1716" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0505" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1518" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2419" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3557" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2414" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4450" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3829" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5829" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5804" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1485" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5806" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5087" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2422" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0865" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4471" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5075" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3557" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3562" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2426" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3567" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4002" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5084" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1711" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1478" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2461" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5820" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5979" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6954" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2470" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4476" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0547" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4540" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0429" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0441" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2451" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2459" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5823" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2421" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0870" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3554" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0862" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2460" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1713" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0706" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0434" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5784" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3568" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5830" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3561" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5800" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4467" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3567" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2456" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5803" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4465" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4472" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5086" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3556" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0425" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2383" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2423" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2447" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2452" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2445" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2450" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5778" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5780" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5073" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3568" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3548" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1493" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2446" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5069" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-5035" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3541" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3566" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3549" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1500" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3562" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3571" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3555" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0426" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0457" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5850" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2783" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3573" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3552" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0451" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0459" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2423" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-1876" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2384" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4469" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0431" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1557" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0458" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2548" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2453" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4448" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3521" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0401" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5085" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2407" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2421" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3564" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2429" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4465" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3569" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2403" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5068" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2548" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0871" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5071" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2398" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0432" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0815" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0444" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1475" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0497" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5774" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5782" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3554" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4469" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1725" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5790" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5805" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3564" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5802" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5849" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1719" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3569" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3573" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0461" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0442" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2448" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2458" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3548" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2427" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5825" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0506" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1484" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2430" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3541" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2415" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3549" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3565" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0872" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3216" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0429" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1718" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5772" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3860" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3422" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0433" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5074" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3554" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3574" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2454" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2444" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5072" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4470" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2436" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4416" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0822" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1537" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3553" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3555" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3551" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2449" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0503" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0025" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2457" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1476" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0169" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0424" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3563" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0809" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5077" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0435" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3544" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0456" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4450" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1723" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1726" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0450" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1571" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4467" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0460" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5081" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3547" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5840" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5851" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2465" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2431" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2473" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6629" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5783" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4448" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2783" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2463" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3560" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2412" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5809" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1480" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4351" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2420" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0501" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0428" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0869" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2417" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2471" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3566" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3551" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2424" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5076" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5842" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2397" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0452" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3553" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1569" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1724" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3558" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5797" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5070" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1486" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2472" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0446" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0453" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3860" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1488" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0502" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3561" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0868" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0440" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0443" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3389" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5814" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5817" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4351" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3551" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2455" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3557" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5089" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/hpsm_00486" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/hpsm_00488" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/hpsm_00489" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/hpsm_00484" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/hpsm_00482" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/hpsm_00483" }, { "trust": 0.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/hpsm_00487" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/hpsm_00485" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-0430.html" }, { "trust": 0.1, "url": "http://www.hp.com/java" }, { "trust": 0.1, "url": "https://www.hp.com/go/swa" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0809" } ], "sources": [ { "db": "CERT/CC", "id": "VU#858729" }, { "db": "VULMON", "id": "CVE-2013-0435" }, { "db": "BID", "id": "57729" }, { "db": "PACKETSTORM", "id": "120166" }, { "db": "PACKETSTORM", "id": "99047" }, { "db": "PACKETSTORM", "id": "120419" }, { "db": "PACKETSTORM", "id": "123734" }, { "db": "PACKETSTORM", "id": "127267" }, { "db": "PACKETSTORM", "id": "123874" }, { "db": "PACKETSTORM", "id": "120036" }, { "db": "PACKETSTORM", "id": "121464" }, { "db": "PACKETSTORM", "id": "120165" }, { "db": "PACKETSTORM", "id": "120030" }, { "db": "PACKETSTORM", "id": "121286" }, { "db": "NVD", "id": "CVE-2013-0435" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#858729" }, { "db": "VULMON", "id": "CVE-2013-0435" }, { "db": "BID", "id": "57729" }, { "db": "PACKETSTORM", "id": "120166" }, { "db": "PACKETSTORM", "id": "99047" }, { "db": "PACKETSTORM", "id": "120419" }, { "db": "PACKETSTORM", "id": "123734" }, { "db": "PACKETSTORM", "id": "127267" }, { "db": "PACKETSTORM", "id": "123874" }, { "db": "PACKETSTORM", "id": "120036" }, { "db": "PACKETSTORM", "id": "121464" }, { "db": "PACKETSTORM", "id": "120165" }, { "db": "PACKETSTORM", "id": "120030" }, { "db": "PACKETSTORM", "id": "121286" }, { "db": "NVD", "id": "CVE-2013-0435" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-02-01T00:00:00", "db": "CERT/CC", "id": "VU#858729" }, { "date": "2013-02-02T00:00:00", "db": "VULMON", "id": "CVE-2013-0435" }, { "date": "2013-02-01T00:00:00", "db": "BID", "id": "57729" }, { "date": "2013-02-09T03:17:18", "db": "PACKETSTORM", "id": "120166" }, { "date": "2011-03-07T08:03:39", "db": "PACKETSTORM", "id": "99047" }, { "date": "2013-02-20T19:22:22", "db": "PACKETSTORM", "id": "120419" }, { "date": "2013-10-23T22:57:57", "db": "PACKETSTORM", "id": "123734" }, { "date": "2014-06-30T23:39:28", "db": "PACKETSTORM", "id": "127267" }, { "date": "2013-11-01T13:37:00", "db": "PACKETSTORM", "id": "123874" }, { "date": "2013-02-02T19:22:22", "db": "PACKETSTORM", "id": "120036" }, { "date": "2013-04-30T21:07:53", "db": "PACKETSTORM", "id": "121464" }, { "date": "2013-02-09T03:12:18", "db": "PACKETSTORM", "id": "120165" }, { "date": "2013-02-05T01:09:08", "db": "PACKETSTORM", "id": "120030" }, { "date": "2013-04-12T00:36:44", "db": "PACKETSTORM", "id": "121286" }, { "date": "2013-02-02T00:55:01.957000", "db": "NVD", "id": "CVE-2013-0435" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-14T00:00:00", "db": "CERT/CC", "id": "VU#858729" }, { "date": "2017-09-19T00:00:00", "db": "VULMON", "id": "CVE-2013-0435" }, { "date": "2017-08-11T18:10:00", "db": "BID", "id": "57729" }, { "date": "2024-11-21T01:47:32.893000", "db": "NVD", "id": "CVE-2013-0435" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "57729" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Oracle Java contains multiple vulnerabilities", "sources": [ { "db": "CERT/CC", "id": "VU#858729" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "arbitrary, code execution", "sources": [ { "db": "PACKETSTORM", "id": "120166" }, { "db": "PACKETSTORM", "id": "120419" }, { "db": "PACKETSTORM", "id": "127267" }, { "db": "PACKETSTORM", "id": "120036" }, { "db": "PACKETSTORM", "id": "120165" } ], "trust": 0.5 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.